发现有病毒或恶意软件在本网站文件上存在,请立即通知我们。
Discover a virus or malware in existence on this Web site files, please notify us immediately.
它不应该在试图除去或已被感染的其他病毒或恶意软件组件清洁的US B驱动器中使用。
It should not be used in attempt to remove or clean USB drives that have been infected with other viruses or malware components.
这包括根据目前的技术工艺水平的合理预防,以避免病毒和/或恶意软件程序侵入合同标的的软件中。
This includes reasonable precautions according to the present technical state of art in order to prevent an intrusion of virus and/or malware programs into the software of the Objects of Contract.
这些工具可以帮助操作者阻止破坏计算机的行为或给予技术人员的能力来从远程计算机上解决恶意软件。
These tools can help block malicious software from disrupting a computer or give a technician the ability to fix a computer from a remote location.
如果我从不同人的计算机中发现了一个模型,这就说明,所有那些人的计算机都感染了相同的,恶意软件,病毒或蠕虫。
The idea being if I find a pattern across multiple people's computers maybe all of those people are infected with the same kind of malware or virus or worm.
一种新的程序旨在对恶意软件施加压力,该程序可以在网络攻击开始之前以禁用,渗透或变换的方法阻止计算机在不知情的情况下成为一个僵尸电脑。
A new program aims to put the squeeze on malicious software that can disable, infiltrate or transform a computer system into an unwitting zombie - before the cyber attack ever materializes.
当检测到或怀疑是恶意软件时,智能手机软件可以从云中的信任备份中恢复。
When malware is detected or suspected, the smartphone software can be restored from trusted backups in the cloud.
建议父母关闭计算机的管理员权限,这样孩子们就不能安装恶意软件或改变系统重要配置。
We advice that parents should to turn off the administrative right to the computer, so that they don't install malicious program or change any important configuration in the operating system.
Conficker程序被设计为了在它占据被感染的计算机后,它能被软件远程控制为一个用于分发广告邮件或其它恶意程序的广域系统服务。
The Conficker program is built so that after it takes up residence on infected computers, it can be programmed remotely by software to serve as a vast system for distributing spam or other malware.
而当你发送电子邮件回家,部分或所有这些恶意软件可能已经转移到你家里的主服务器上了,这是真的。
And when you emailed back home, some or all of the malware may have migrated to your home server. This is not hypothetical.
当研究人员寻找恶意软件和攻击的载体时,他们往往会寻找接口或代码中的漏洞。
When researchers look for malware and attack vectors, the tendency is to look for vulnerabilities in portals or code.
这就使得黑客能更轻易的通过恶意软件暗中盗取用户信息或使用手机功能。
That makes it easier for hackers to create applications that surreptitiously spy on users or access phone functions without permission.
网络安全公司赛门铁克的统计显示,全球垃圾邮件的数量已占据电子邮件总量的86%,其中“携毒邮件”或包含恶意软件的邮件占垃圾邮件总数的4.5%。
Worldwide spam now makes up 86% of all emails and "toxic" spam or spam that contains malware accounts for 4.5% of all spam, said the Internet security firm Symantec.
网站现在成了受黑客青睐的传播恶意软件的工具,部分原因是通过社交媒体网站发送垃圾邮件或链接可以让计算机神不知鬼不觉地被感染。
Websites are now the favoured means of spreading malware, partly because the unwary are directed to them through spam or links posted on social-networking sites.
Grosse:确实,那些谈论网络中的入侵检测、恶意软件检测或深度包检测的法规正逐渐被当前技术潮流所忽略。
Grosse: I agree that regulations that would talk about intrusion detection or malware detection or deep pack-et inspection on the network really are being passed by with current technology trends.
据Websense公司称,恶意软件检查出浏览器中存在漏洞后,网站受害者的最后一站为下载软件,首先试图在用户的桌面上下载adobe公司或QuickTime软件。
The final stop for a Web victim includes a drive-by download attempt after the malware checks for vulnerabilities in the browser, Adobe or Quicktime software on the user's desktop.
恶意软件的一种常见攻击类型,所谓的缓冲区溢出攻击,会使接受输入的程序崩溃,如web浏览器的地址栏或数据库的搜索窗口。
One common type of malware, called a buffer overflow attack, overwhelms programs that accept input, like the address line in a Web browser or a search window for a database.
一些恶意软件可能会毁坏或删除外置硬盘上的文件。
And malicious software could corrupt or erase files on the external drive.
恶意软件是软件,根本无视用户的选择如何他或她的计算机将被用于。
Badware is software that fundamentally disregards a user's choice over how his or her computer will be used.
攻击者可以让其恶意软件或假冒网站得到检查SHA- 1哈希以验证的任何系统的信任。
An attacker can allow its malware or fake site to be checked for SHA-1 hashes to verify the trust of any system.
为了减轻系统的负载上,反恶意软件的背景后卫以前才开始的,当系统文件被打开或执行。
To ease the load on the system, the Anti-Malware background guard previously only started when files in the system were opened or executed.
一个恶意软件5.0的新功能的反是一个文件看守,扫描,文件时,下载或访问的进步,将产品交给一个完整的反病毒系统。
A new feature of Anti-Malware 5.0 is a file guard that scans files when they are downloaded or accessed, which advances the product to a full anti-virus system.
随后,目的是检测恶意软件,使用的是漏洞或弱点。
Subsequently, the aim is to detect a malware that is using an exploit or vulnerability.
经过许可或测试期已经结束,反恶意软件仍然可以使用5守卫功能免费无。
After a license or test period has expired, Anti-Malware 5 can still be used free of charge without the guard features.
如何排除或忽略的恶意软件项目?
如何卸载或删除的恶意软件保护?
如何激活或注册恶意软件保护?
例如,一个木马或病毒被认为是恶意软件。
For example, a Trojan horse or a virus is considered malware.
桌面安全2010弹出,恶意软件的缩写,是为了不入侵或破坏用户的计算机系统知道该软件。
Security 2010 pop-up, short for malicious software, is the software designed to invade or destroy computer system without the users' knowing.
桌面安全2010弹出,恶意软件的缩写,是为了不入侵或破坏用户的计算机系统知道该软件。
Security 2010 pop-up, short for malicious software, is the software designed to invade or destroy computer system without the users' knowing.
应用推荐