Voorbeelden van het gebruik van Hacker-controlled in het Engels en hun vertalingen in het Nederlands
{-}
-
Colloquial
-
Official
-
Ecclesiastic
-
Medicine
-
Financial
-
Computer
-
Ecclesiastic
-
Official/political
-
Programming
Once they are installed a common tactic is to reconfigure the browsers into redirecting to a hacker-controlled page.
If this is done the virus will be downloaded from a hacker-controlled site and executed on the local computer.
We expect to see Trojan-like behavior by inducing a network connection to a hacker-controlled server.
If this is done the threat is downloaded from a hacker-controlled site and executed on the local machine.
Once they are run a connection to a hacker-controlled server will be made which will download complex mathematical tasks.
If a network connection is made to the hacker-controlled servers it can be used to overtake control of the affected machines, as well as deliver additional threats.
They will set up a client connection to a hacker-controlled server using a secure
They are then distributed on hacker-controlled portals, file sharing networks(like BitTorrent) and email messages.
They server the same function as described in the distribution paragraph- to redirect the victims to a hacker-controlled landing page by changing the browser settings.
When they are run the users will be redirected to a hacker-controlled page and may also find that important settings will be changed.
redirect the users to a hacker-controlled domain.
secure connection to a hacker-controlled server.
In certain cases the scripts can also lead to Trojan infections- viruses that establish a secure connection to a hacker-controlled server.
The Darkcomet virus has been found to contain a batch script that can interact with a hacker-controlled server.
If a Trojan instance is included it will establish a connection with a hacker-controlled server.
The typical approach is to establish a secure connection with a hacker-controlled server.
Com browser hijacker represents a malicious web browser plugin that is used to redirect the victims to a hacker-controlled page.
The hackers can use hyperlinks to spread the BananaCrypt viruses hosted on hacker-controlled sites.
The captured samples have been found to download the main Trojan executable which will set up a secure connection to the hacker-controlled server.
They represent dangerous web browser pluginst that have the primary task of redirecting the victim users to a hacker-controlled site.