malicious use of process oor Spaans

malicious use of process

Vertalings in die woordeboek Engels - Spaans

demanda de mala fe

Termium

demanda maliciosa

Termium

Geskatte vertalings

Vertoon algoritmies gegenereerde vertalings

voorbeelde

wedstryd
woorde
Advanced filtering
Voorbeelde moet herlaai word.
(One might also argue that a union's filing of a state court lawsuit to enforce discipline against a nonmember provides a basis for a civil remedy under an abuse of process or malicious use of process theory.)
Por favor, entra al aguaParaCrawl Corpus ParaCrawl Corpus
(One might also argue that a union’s filing of a state court lawsuit to enforce discipline against a nonmember provides a basis for a civil remedy under an abuse of process or malicious use of process theory.)
Considera que el importe de referencia indicado en la propuesta legislativa debe ser compatible con el límite máximo de la rúbrica #a del marco financiero plurianual actual #-# y con las disposiciones del apartado # del Acuerdo Interinstitucional (AII) de # de mayo de #; señala que las financiaciones para después de # se evaluarán en el contexto de las negociaciones para el próximo marco financieroParaCrawl Corpus ParaCrawl Corpus
A large number of malicious programs use the names of legitimate processes to hide their presence on the computer.
Volveremos mas tardeParaCrawl Corpus ParaCrawl Corpus
All States have the responsibility to act to establish appropriate regimes to prevent, detect and respond to malicious acts involving nuclear material and against the facilities in which they are legitimately produced, processed, used, handled, stored or disposed of.
Por favor, no te acerquesUN-2 UN-2
All States have the responsibility to act to establish appropriate regimes to prevent, detect and respond to malicious acts involving nuclear material and against the facilities in which they are legitimately produced, processed, used, handled, stored or disposed of
Los únicos cuerdos en esta ciudad, sois tú y el DrMultiUn MultiUn
Subject only to clause #.# below, in no case shall this insurance cover loss damage liability or expense directly or indirectly caused by or contributed to by or arising from the use or operation, as a means for inflicting harm, of any computer, computer system, computer software programme, malicious code, computer virus or process or any other electronic system
Creo que me intitulo a esooj4 oj4
Subject only to clause 10.2 below, in no case shall this insurance cover loss damage liability or expense directly or indirectly caused by or contributed to by or arising from the use or operation, as a means for inflicting harm, of any computer, computer system, computer software programme, malicious code, computer virus or process or any other electronic system.
Los delitos contra la Ley de # de marzo de # son punibles con penas desde ocho días a cinco años de privación de libertadnot-set not-set
Microsoft's security experts said that although they've seen no evidence of "malicious use" of the data, they are in the process of informing users that could be affected.
Ay. eres tan-- Es un poco preverbalParaCrawl Corpus ParaCrawl Corpus
The technique of process hollowing is used by malicious software to load an authorized process with the sole purpose of acting as a vessel for hostile code.
Consulte a su médico o farmacéutico antes de tomar cualquier medicamentoParaCrawl Corpus ParaCrawl Corpus
deletes functionality of malicious programs used to hide malicious files and processes (rootkit).
Despues de que rompio, Siago inhalaba mas y mas cada diaParaCrawl Corpus ParaCrawl Corpus
Malicious Trojan.gen.2 components can be used for a variety of different processes.
Pero si alguien desea venir conmigo, no lo rechazaréParaCrawl Corpus ParaCrawl Corpus
For example, more advanced projects of this type tend to mask the malicious process' hardware usage, therefore hiding the fact that an unknown service is using 80-90% of processing power.
¿ Qué tiene de malo tu vida?ParaCrawl Corpus ParaCrawl Corpus
Use extreme causing when deleting related files since some might be legitimate parts of the operating system simply being used by the malicious process.
Un día, es verdad, la oigoParaCrawl Corpus ParaCrawl Corpus
We will use all reasonable endeavours to maintain for our own systems anti-denial-of-service (DOS) and anti-distributed-denial-of-service (DDOS) protection, anti-virus and other technological means and processes to safeguard access to our systems and the information contained in it against malicious attack.
¿ Ha visto de dónde vino?- ¡ Ah!Common crawl Common crawl
Enhanced Protected Mode provides additional protection against malicious websites by using 64-bit processes on 64-bit versions of Windows.
Todos en el sistema de justicia criminal saben que un estudio de diagnóstico de # días no llega a tomar # díasParaCrawl Corpus ParaCrawl Corpus
They had already surmised that a malicious power was behind the process of destruction, which affects us all, but they needed more facts.
Los principales países exportadores, a saber, los Estados Unidos de América y la República Popular China, representaron casi el # % de dichas importaciones durante el período consideradoParaCrawl Corpus ParaCrawl Corpus
Process Doppelgänging attack works by using NTFS transactions to launch a malicious process by replacing the memory of a legitimate process, tricking process monitoring tools and antivirus into believing that the legitimate process is running.
Hace mucho que no estamos juntosParaCrawl Corpus ParaCrawl Corpus
Current state of technology provides an opportunity to eliminate risks of malicious intervention into the voting process by performing elections using blockchain.
Considerando que, según las estadísticas, cada año mueren más de # personas en las carreteras de la UEParaCrawl Corpus ParaCrawl Corpus
80 sinne gevind in 45 ms. Hulle kom uit baie bronne en word nie nagegaan nie.