Examples of using Malicious activity in English and their translations into Hungarian
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Financial
-
Programming
-
Official/political
-
Computer
are often blocked at the ISP level in an attempt to prevent malicious activity.
Adware Helpers are dubious computer programs that are often employed by various malicious applications to convey potentially malicious activity.
to help detect malicious activity.
are often blocked at the ISP level in an attempt to prevent malicious activity.
This is a set of data that can help an administrator of the corporate IT infrastructure to discover any malicious activity in the system and take appropriate action.
usernames of login attempts are conditionally recorded in order to verify malicious activity and protect the website from specific types of attack.
Kaspersky Small Office Security allows you to organize the protection of basic information resources and eliminate malicious activity.
Kaspersky researchers compared malicious activity under the name of nominated films during the first four weeks after the public premiere of the film.
Since the affected devices are legitimately owned by businesses or individuals, malicious activity conducted from infected devices could be mistakenly attributed to those who were actually victims of the actor,” Cisco's advisory pointed out.
other criminal or malicious activity that might compromise your information.
the access point(the router etc.) to perform potentially malicious activity.
carry out some other malicious activity.
Despite all the red flags displayed by the Easy Email Login add-on, this extension is not linked to any malicious activity, so you do not need to fear for the safety of your system.
An indicator of compromise is information on the signs of malicious activity, which is structured in such a way that it can be fed into automated tools designed to check the infrastructure for signs of infection.
the identifiers of connected users and usernames of login attempts are conditionally recorded in order to verify malicious activity and protect the website from specific types of attack.
scientists wanted to identify how to compress network traffic as much as possible without losing the ability to detect and investigate malicious activity.
the ID of the connected users and the login attempts are recorded conditionally to check the malicious activity and protect the site against specific types of attacks.
To sum up, EliteUnzip Toolbar should be removed immediately before you perform other malicious activities.
In reality, only 0.01% of all malicious activities are associated with spamming.
This particular shield alerts the user when such malicious activities are attempted in the Windows Host Files.