malicious code

collocation in English

meaningsofmaliciousandcode

These words are often used together. Click on the links below to explore the meanings. Or,see other collocations withcode.
malicious
adjective
uk
/məˈlɪʃ.əs/
us
/məˈlɪʃ.əs/
intended to harm or upset ...
See more atmalicious
code
noun
uk
/kəʊd/
us
/koʊd/
a system of words, letters, or signs used to represent a message in secret form, or a system of numbers, letters, or signals used to represent something in a shorter or more ...
See more atcode

(Definition ofmaliciousandcodefrom theCambridge English Dictionary© Cambridge University Press)

Examplesofmalicious code

These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
We have, in particular, included provisions to penalise the use of tools such asmaliciouscodethat are used to create so-called botnets, which have been used by criminals.
FromEuroparl Parallel Corpus - English
Maliciouscodealso includes spyware, which are deceptive programs, installed without authorization, that monitor a consumers activities without their consent.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Hardware-set permission levels make it much more difficult formaliciouscodeto take control of the system.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
In fact, in this way the attacker simply calls preexisting functions without the need to injectmaliciouscodeinto a program.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
To guard againstmaliciouscode, all resources beyond the basic memory allocation are required to be granted to each script.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
This preventsmaliciouscodefrom being inserted into an existing package, and so gaining access to package-scoped classes and data.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
The chance of the end-user being exposed tomaliciouscodewhen dealing with cracked applications or games is more than 50%.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
It stops viruses and othermaliciouscodebefore they spread to end-usersdesktops and corporate servers.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
The firmware in receivers themselves can not be overwritten withmaliciouscodevia satellite as provider-issued receivers are.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
A source file can be overwritten such that it includes a call to somemaliciouscode.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
It will download large portions of the website and injectmaliciouscodeinto the website's files before uploading the files back onto the server.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Provisions addressed the distribution ofmaliciouscodeand denial of service attacks.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
It is the responsibility of the website developers to filter out suchmaliciouscode.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
As a consequence, these security properties can be established and maintained in the presence of new objects that contain unknown and possiblymaliciouscode.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
However, hackers may inject vulnerable and popular websites withmaliciouscodein order to spread the infection once users visit these sites.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Antivirus can be used to prevent propagation ofmaliciouscode.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Sality was first discovered in 2003 and has advanced over the years to become a dynamic, enduring and full-featured form ofmaliciouscode.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
An attacker will alter a variable that is passed to one of these functions to cause it to includemaliciouscodefrom a remote resource.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
In this case, the person placing themaliciouscodeneed not crack the passwords to the organizational network, the legitimate user has provided access via a normal and routine log-in.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Once found, they can infect systems withmaliciouscodeand then remotely control the system or computer by sending commands to view content or to disrupt other computers.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
Want to learn more?
Go to the definition ofmalicious
Go to the definition ofcode
See other collocations withcode