Examples of using Infected computers in English and their translations into Swedish
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Ecclesiastic
-
Official/political
-
Computer
-
Programming
-
Political
which may cause severe damage to the infected computers.
steal their files plus perform spyware activities on the infected computers.
The infiltrated malicious software serves as a backdoor for hackers to access the infected computers and take control over them remotely.
A ransomware virus, which uses multiple encryption ciphers to encode the files on the infected computers has been reported to be spread in the wild under the name NZMR.
which may cause severe damage to the infected computers.
steal their files plus perform spyware activities on the infected computers.
requires that the users of the infected computers pay for the decryption.
steal their files plus perform spyware activities on the infected computers.
you must also remove the Blaster worm and the Nachi worm from any infected computers.
it can damage the infected computers in the same way.
Note It has not been confirmed that any current versions of this worm have infected computers that are running Windows Server 2003 or Windows NT 4.0.
The creators of the botnet do not appear to have utilized the infected computers for any operations yet.
They do this by creating copies of themselves on infected computers, which then spread to other computers by several channels including email,
Other variant of the devastating Locky ransomware virus has been detected by malware researchers out in the open to demand the sum of 3 BTC as a ransom on infected computers.
Emsisoft Emergency Kit It contains a set of free programs that can be used without installation to scan and clean infected computers from malicious programs such as viruses,
you can sell those infected computers-- somebody else's computers-- to these guys.
Gameover ZeuS contains a p2p(peer-to-peer) functionality which makes the disruption of command-and-control servers ineffective. The functionality enables that infected computers can receive commands also in situations where a command-and-control server does not reply to commands.
preserve the secret nature of the communication between the infected computers and the command.
The ransomware infection's primary purpose is to overwrite the MBR of the infected computers and then aim to perform different types of activities,
Then the infected computer can be booted from the CD.