词汇 | example_english_anti-spyware |
释义 | Examples of anti-spywareThese examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors. Older versions of the client had been branded as malicious adware by some antivirus and anti-spyware vendors. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Like most anti-virus software, many anti-spyware/adware tools require a frequently updated database of threats. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Each version includes anti-spyware, antivirus, and anti-rootkit protection, as well as integrated protection against real-time threats. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. All services to the public are free, including malware and rootkit cleanup of infected computers and removal instructions on rogue anti-spyware programs. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. However, recent versions of these major firms' home and business anti-virus products do include anti-spyware functions, albeit treated differently from viruses. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. In response to the emergence of spyware, a small industry has sprung up dealing in anti-spyware software. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. A number of jurisdictions have passed anti-spyware laws, which usually target any software that is surreptitiously installed to control a user's computer. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Anti-virus and anti-spyware software are helpful, but must be kept up-to-date with new pattern files at least every few days. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Clicking the icon will take the user to a rogue anti-spyware site. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. It masquerades as anti-spyware software and attempts to contact a server in order to receive instructions. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. It is recommended that users do not install any freeware claiming to be anti-spyware unless it is verified to be legitimate. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Earlier versions of anti-spyware programs focused chiefly on detection and removal. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. This kind of anti-spyware can often be set to scan on a regular schedule. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. As a general rule, anti-spyware applications with higher privileges will defeat keyloggers with lower privileges. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. No software-based anti-spyware application can be 100% effective against all keyloggers. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. However, the particular technique that the anti-spyware application uses will influence its potential effectiveness against software keyloggers. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. It offers anti-virus, anti-spyware, game security, and unified corporate security. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Usually, booting the infected computer in safe mode allows an anti-spyware program a better chance of removing persistent spyware. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. As a result, anti-spyware software is of limited usefulness without regular updates. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Also, software-based anti-spyware can not defeat non-software keyloggers (for example, hardware keyloggers attached to keyboards will always receive keystrokes before any software-based anti-spyware application). From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. It has also tried venturing out into information security by way of products like an anti-spyware and secure data token. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. As new spyware programs are released, anti-spyware developers discover and evaluate them, adding to the list of known spyware, which allows the software to detect and remove new spyware. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Early on, anti-virus firms expressed reluctance to add anti-spyware functions, citing lawsuits brought by spyware authors against the authors of web sites and programs which described their products as spyware. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors. |
反思网英语在线翻译词典收录了377474条英语词汇在线翻译词条,基本涵盖了全部常用英语词汇的中英文双语翻译及用法,是英语学习的有利工具。