Examples of using Malicious objects in English and their translations into Russian
{-}
-
Official
-
Colloquial
A report on the top ten email addresses to which the largest number of malicious objects were sent based on conclusions of the Anti-Virus component.
For Android OS devices, the application performs the Skip action and does not delete malicious objects from the device.
At present day, in the world there is more than 300 thousand new malicious objects.
since they may contain viruses and other malicious objects.
You are advised to apply this processing method to any malicious objects which cannot be disinfected.
By default, the application attempts to disinfect detected malicious objects; the Disinfect objects if possible box is checked.
At the same time, malicious objects, depending on the impending danger, can be assigned to different categories.
running with the settings recommended by Kaspersky Lab, and either no malicious objects have been discovered by a virus scan or all detected malicious objects have been disinfected.
If your databases are obsolete for one week- then your antivirus software is unable to detect more than two million malicious objects(except those that it will be able to determine based on their behavior).
click the link to the right of the Add the following text to the subject of an infected email message setting name to open the Tag for messages that contain malicious objects window.
you can obtain statistical information about the application's operation for example, how many malicious objects have been detected
Information about all malicious objects and actions(including the name of the detected object,
Prompt the user for actions when a malicious object is detected.
Block the object, move the malicious object to the special quarantine folder.
Disinfect- attempt to disinfect the malicious object.
You can change the action of the application on the detected malicious object.
Set an action which the application takes on a detected malicious object.
the application deletes the malicious object.
Set an action in respect of a detected malicious object.
Figure 15: Response of the application to a malicious object.