您希望如何使用 PONS.com?

已经订阅无广告版的PONS了吗?

广告版的PONS

像往常一样访问PONS.com并进行广告跟踪和广告投放

有关追踪的详细信息,请参阅数据保护信息和隐私设置

PONS Pur

无第三方广告

无广告跟踪

立即订阅

如果您已经拥有PONS.com免费账户,

We process your data to deliver content or advertisements and measure the delivery of such content or advertisements to extract insights about our website. We share this information with our partners on the basis of consent and legitimate interest. You may exercise your right to consent or object to a legitimate interest, based on a specific purpose below or at a partner level in the link under each purpose. These choices will be signaled to our vendors participating in the Transparency and Consent Framework.

Cookies, device or similar online identifiers (e.g. login-based identifiers, randomly assigned identifiers, network based identifiers) together with other information (e.g. browser type and information, language, screen size, supported technologies etc.) can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here.

Advertising and content can be personalised based on your profile. Your activity on this service can be used to build or improve a profile about you for personalised advertising and content. Advertising and content performance can be measured. Reports can be generated based on your activity and those of others. Your activity on this service can help develop and improve products and services.

qualifications
Malware (Computerprogramm mit offener oder verdeckter Schadfunktion)
英语
英语
德语
德语
mal·ware [ˈmælweəʳ, -wer] 名词 no pl
malware
打开开放词典条目
malware 名词
malware (malicious software) 计算机
德语
德语
英语
英语
PONS OpenDict

您想添加一个词、一个短语或一段译文吗?

請將您的新條目傳送給 PONS OpenDict。 提交的建議將由 PONS 編輯部審核,並根據情況納入結果。

添加词条
No example sentences available

No example sentences available

Try a different entry

单语范例(未经PONS编辑处理)
Malware is sometimes used broadly against government or corporate websites to gather guarded information, or to disrupt their operation in general.
en.wikipedia.org
When the user closes the bad page, the malware goes with it leaving other tabs and the computer unaffected.
en.wikipedia.org
Data recovery tools in this version allow users to recover deleted or malware-damaged files.
en.wikipedia.org
Malware can override the communication (both input via keyboard and output via application screen) between the user and the application.
en.wikipedia.org
It consists of deleting files from the computer and running tools that flag and remove malware.
en.wikipedia.org
互联网提供的例句(未经PONS编辑处理)
[...]
And even if we manage to keep our electronic devices safe they might still be vulnerable to hacking attacks or malware.
[...]
bookboon.com
[...]
Und selbst wenn wir es schaffen, unsere Geräte zu sichern, können sie weiter anfällig für Hackerattacken oder Malware sein.
[...]
[...]
When the malware spreads via mapped drives, it checks whether any of the following drives are present on the computer and then tries to spread through them:
[...]
www.anti-spyware-101.com
[...]
Wenn die Malware über zugeordnete Laufwerke ausbreitet, es prüft, ob die folgenden Laufwerke auf dem Computer, und dann versucht, durch sie zu verbreiten vorhanden sind:
[...]
[...]
The Protected Repair Environment© allows you to to scan and fix machines already infected with very aggressive malware that might stop security software from working.
[...]
www.safer-networking.org
[...]
Eines dieser Werkzeuge ist die “Geschütze Reparatur-Umgebung ‘©, welche es Ihnen ermöglicht Ihr System zuverlässig zu untersuchen, obwohl es bereits mit sehr aggressiver Malware, die unter normalem Betrieb in der Lage wäre, Sicherheits-Software zu stören, befallen ist.
[...]
[...]
As there is nowadays many spyware and malware out there, it is important to make sure that your own server stays clean.
[...]
www.ab-weblog.com
[...]
Nachdem heutzutage sehr viel Spyware und Malware im Umlauf ist, ist es umso wichtiger sicherzustellen, dass der eigene Server stets sauber bleibt.
[...]
[...]
To protect business continuity, it is essential to keep production networks and industrial control systems completely separate from office automation systems, reducing the risk of these network segments being affected by malware.
[...]
www.dearbytes.com
[...]
Zur Gewährung der Betriebskontinuität ist es wichtig, Produktionsnetzwerke und industrielle Kontrollsysteme von der Büroautomatisierung komplett getrennt zu halten, um die Gefahr zu verringern, dass diese Netzwerksegmente durch Malware angegriffen können werden.
[...]