- malware detection
- обнаружение (выявление) вредоносного ПОсм. тж. malware
Англо-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. . 1998-2007.
Англо-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. . 1998-2007.
Malware — Malware, short for malicious software, consists of programming (code, scripts, active content, and other software) designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, gain unauthorized access… … Wikipedia
Intrusion detection system — An intrusion detection system (IDS) is a device or software application that monitors network and/or system activities for malicious activities or policy violations and produces reports to a Management Station.[1] Some systems may attempt to stop … Wikipedia
MS Antivirus (malware) — MS Antivirus Developer(s) Bakasoftware, Innovative Marketing, Inc. Operating system Microsoft Windows Type Rogue software MS Antivirus (also known as Spyware Protect 2009) is a scareware rogue anti virus which claims to remove f … Wikipedia
Linux malware — includes viruses, trojans, worms and other types of malware that affect the Linux operating system. Linux, Unix and other Unix like computer operating systems are generally regarded as very well protected, but not immune, from computer viruses.… … Wikipedia
Ransomware (malware) — For other uses, see Ransomware (disambiguation). Ransomware is computer malware which holds a computer system, or the data it contains, hostage against its user by demanding a ransom for its restoration. Operation Ransomware typically propagates… … Wikipedia
Blue Pill (malware) — Blue Pill is the codename for a controversial rootkit based on virtualization technology that targets Microsoft s Windows Vista operating system. Blue Pill uses AMD Pacifica virtualization technology, but reportedly could be ported to use Intel… … Wikipedia
Extrusion detection — or outbound intrusion detection is a branch of intrusion detection aimed at developing mechanisms to identify successful and unsuccessful attempts to use the resources of a computer system to compromise other systems. Extrusion detection… … Wikipedia
Network Behavior Anomaly Detection — Contents 1 Network Behavior Anomaly Detection (NBAD) 2 Popular Threat Detections within NBAD 3 Commercial NBAD Products 4 External links … Wikipedia
Rootkit — A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality or other applications. The term rootkit is a concatenation… … Wikipedia
Рутковская, Йоанна — В Википедии есть статьи о других людях с такой фамилией, см. Рутковская. Йоанна Рутковская Joanna Rutkowska … Википедия
Microsoft Security Essentials — Microsoft Security Essentials … Wikipedia