malicious code
collocation in Englishmeaningsofmaliciousandcode
These words are often used together. Click on the links below to explore the meanings. Or,see other collocations withcode.
malicious
adjective
uk/məˈlɪʃ.əs/us/məˈlɪʃ.əs/
intended to harm or upset ...
See more atmalicious
code
noun
uk/kəʊd/us/koʊd/
a system of words, letters, or signs used to represent a message in secret form, or a system of numbers, letters, or signals used to represent something in a shorter or more ...
See more atcode
(Definition ofmaliciousandcodefrom theCambridge English Dictionary© Cambridge University Press)
Examplesofmalicious code
These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
We have, in particular, included provisions to penalise the use of tools such asmaliciouscodethat are used to create so-called botnets, which have been used by criminals.
FromEuroparl Parallel Corpus - English
Maliciouscodealso includes spyware, which are deceptive programs, installed without authorization, that monitor a consumers activities without their consent.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Hardware-set permission levels make it much more difficult formaliciouscodeto take control of the system.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
In fact, in this way the attacker simply calls preexisting functions without the need to injectmaliciouscodeinto a program.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
To guard againstmaliciouscode, all resources beyond the basic memory allocation are required to be granted to each script.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
This preventsmaliciouscodefrom being inserted into an existing package, and so gaining access to package-scoped classes and data.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
The chance of the end-user being exposed tomaliciouscodewhen dealing with cracked applications or games is more than 50%.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
It stops viruses and othermaliciouscodebefore they spread to end-usersdesktops and corporate servers.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
The firmware in receivers themselves can not be overwritten withmaliciouscodevia satellite as provider-issued receivers are.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
A source file can be overwritten such that it includes a call to somemaliciouscode.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
It will download large portions of the website and injectmaliciouscodeinto the website's files before uploading the files back onto the server.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Provisions addressed the distribution ofmaliciouscodeand denial of service attacks.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
It is the responsibility of the website developers to filter out suchmaliciouscode.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
As a consequence, these security properties can be established and maintained in the presence of new objects that contain unknown and possiblymaliciouscode.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
However, hackers may inject vulnerable and popular websites withmaliciouscodein order to spread the infection once users visit these sites.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Antivirus can be used to prevent propagation ofmaliciouscode.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Sality was first discovered in 2003 and has advanced over the years to become a dynamic, enduring and full-featured form ofmaliciouscode.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
An attacker will alter a variable that is passed to one of these functions to cause it to includemaliciouscodefrom a remote resource.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
In this case, the person placing themaliciouscodeneed not crack the passwords to the organizational network, the legitimate user has provided access via a normal and routine log-in.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Once found, they can infect systems withmaliciouscodeand then remotely control the system or computer by sending commands to view content or to disrupt other computers.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
Want to learn more?
Go to the definition ofmalicious
Go to the definition ofcode
See other collocations withcode