词汇 | example_english_malicious-code |
释义 | malicious codecollocation in Englishmeanings of maliciousand codeThese words are often used together. Click on the links below to explore the meanings. Or, see other collocations with code. malicious adjective uk /məˈlɪʃ.əs/ us /məˈlɪʃ.əs/ intended to harm or upset ... See more at malicious code noun uk /kəʊd/ us /koʊd/ a system of words, letters, or signs used to represent a message in secret form, or a system of numbers, letters, or signals used to represent something in a shorter or more ... See more at code Examples of malicious codeThese examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors. We have, in particular, included provisions to penalise the use of tools such as maliciouscode that are used to create so-called botnets, which have been used by criminals. From Europarl Parallel Corpus - English Maliciouscode also includes spyware, which are deceptive programs, installed without authorization, that monitor a consumers activities without their consent. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Hardware-set permission levels make it much more difficult for maliciouscode to take control of the system. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. In fact, in this way the attacker simply calls preexisting functions without the need to inject maliciouscode into a program. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. To guard against maliciouscode, all resources beyond the basic memory allocation are required to be granted to each script. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. This prevents maliciouscode from being inserted into an existing package, and so gaining access to package-scoped classes and data. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The chance of the end-user being exposed to maliciouscode when dealing with cracked applications or games is more than 50%. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. It stops viruses and other maliciouscode before they spread to end-usersdesktops and corporate servers. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The firmware in receivers themselves can not be overwritten with maliciouscode via satellite as provider-issued receivers are. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. A source file can be overwritten such that it includes a call to some maliciouscode. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. It will download large portions of the website and inject maliciouscode into the website's files before uploading the files back onto the server. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Provisions addressed the distribution of maliciouscode and denial of service attacks. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. It is the responsibility of the website developers to filter out such maliciouscode. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. As a consequence, these security properties can be established and maintained in the presence of new objects that contain unknown and possibly maliciouscode. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. However, hackers may inject vulnerable and popular websites with maliciouscode in order to spread the infection once users visit these sites. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Antivirus can be used to prevent propagation of maliciouscode. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Sality was first discovered in 2003 and has advanced over the years to become a dynamic, enduring and full-featured form of maliciouscode. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. An attacker will alter a variable that is passed to one of these functions to cause it to include maliciouscode from a remote resource. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. In this case, the person placing the maliciouscode need not crack the passwords to the organizational network, the legitimate user has provided access via a normal and routine log-in. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Once found, they can infect systems with maliciouscode and then remotely control the system or computer by sending commands to view content or to disrupt other computers. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors. Want to learn more? Go to the definition of malicious Go to the definition of code See other collocations with code |
反思网英语在线翻译词典收录了377474条英语词汇在线翻译词条,基本涵盖了全部常用英语词汇的中英文双语翻译及用法,是英语学习的有利工具。