Examples of using Malicious code in English and their translations into Polish
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Ecclesiastic
-
Financial
-
Official/political
-
Programming
-
Computer
ESET Security Management Center does not provide protection against malicious code on its own, it relies on the presence of ESET security solutions on each client.
Sometimes, you will even find a malicious code like malware or viruses‘living' inside the torrent files.
Cyber threats can manifest as suspicious network activity, malicious code, viruses, Trojans,
If the site contains malicious code, Kaspersky Internet Security 18 for Mac blocks it
Real-time protection of the file system against malicious code: intercept
To get rid of the malicious code that could interrupt the application of the camera on the android,
If any malicious code is detected, Kaspersky Internet Security for Mac blocks the file
People in those roles can always publish malicious code directly, without resorting to complicated exploits.
Integration of ESET Endpoint Security with email clients increases the level of active protection against malicious code in email messages.
If the system is attacked by malicious code that behaves as a rootkit, the user is
You may not upload viruses or malicious code, or do anything that could disable,
Malicious Code" means viruses, worms, time bombs, Trojan horses and other harmful or malicious code, files, scripts,
Integration of ESET NOD32 Antivirus with your email client increases the level of active protection against malicious code in email messages.
Because of the enormous amount of malicious code circulating the Internet, safe Internet browsing is a very important aspect of computer protection.
Apply cleaning if a file has been attacked by a virus that has attached malicious code to the file.
such as allowing malicious code through the firewall.
updating program components are important parts of maintaining complete protection against malicious code.
SMTP protocols is thoroughly scanned for threats. Malicious code is filtered before it can cause any damage to end users on your network.
cannot place any malicious code onto your computer.
information about the number of files found that contain malicious code.