Examples of using Compromised computer in English and their translations into Italian
{-}
-
Colloquial
-
Official
-
Medicine
-
Financial
-
Ecclesiastic
-
Ecclesiastic
-
Computer
-
Programming
-
Official/political
execute files as an administrator on the compromised computer and also perform different types of modifications in the Windows Registry Editor.
harass or use a compromised computer as part of a sophisticated botnet to stage DDoS attacks on large institutions.
The ransomware aims to encrypt the files on the compromised computer and then show the user a ransom note wallpaper,
The ransomware aims to encrypt the files on the compromised computer and then show the user a ransom note wallpaper,
These networks of compromised computers serve as efficient means of launching an attack.
Botnets are networks from compromised computers that are controlled externally by remote hackers.
This particular adware terribly affects the particular privacy associated with compromised COMPUTER users.
Such a network of compromised computers("zombies") may be activated to perform specific actions,
Such a network of compromised computers("zombies") may be activated to perform specific actions such as attacks against information systems cyber attacks.
may be displayed as a string of random characters on compromised computers that do not have a Japanese language operating system installed.
The virus aims to perform different activities on compromised computers, the main of which is to encrypt the files on the ones infected by it.
as they use the compromised computers to launch attacks against information systems.
Botnet A network of a large number of compromised computers centrally controlled by a botmaster.
are usually delivered in large volumes from botnets of compromised computers.
A network of a large number of compromised computers that are controlled centrally by a botmaster.
as it uses sophisticated RSA+AES encryption combination to encrypt the files on compromised computers.
private organizations in more than 100 countries were attacked by a network of compromised computers which extracted sensitive and classified documents.
The virus aims to perform different activities on compromised computers, the main of which is to encrypt the files on the ones infected by it.
But the complex Conficker botnet-- now fairly quiet outside of attempts to sell fake anti-virus software-- remains undiminished as a command-and-control structure of about 4.5 million compromised computers it quietly holds as zombies.
Exe and places it on the compromised computer's C:\ drive.