-
1 злонамеренное воздействие
Security: attack, malevolent attack, malicious attackУниверсальный русско-английский словарь > злонамеренное воздействие
-
2 злонамеренное действие
1) Law: willful misconduct2) Security: abusive action, attack, malevolent attack, malicious attackУниверсальный русско-английский словарь > злонамеренное действие
-
3 нападение
1. onset2. onslaughtяростно напасть, совершить нападение — to make an onslaught
3. assailing4. hold up5. attack; aggression; forwards6. aggression7. assaultлицо, подвергшееся нападению — person assaulted
Синонимический ряд:налет (сущ.) атака; налет; наскокАнтонимический ряд:защита; защиту; оборона; оборону -
4 оспаривать
гл.to attack; challenge; contest; dispute; impeach; impugn; traverse; ( в суде) to litigateоспаривать гражданский иск о злонамеренном преследовании — to challenge (contest, impugn) a civil court action for malicious persecution
оспаривать завещание (действительность завещания) — to attack (challenge, contest, impugn) a will (the validity of a will)
оспаривать обвинение (в необъективности / предвзятости) — to challenge (contest, dispute) a charge of bias
- оспаривать действительность документаоспаривать ходатайство об отклонении иска — to argue (challenge, contest, dispute) a motion to dismiss
- оспаривать законность
- оспаривать заявление
- оспаривать иск
- оспаривать притязание
- оспаривать патент
- оспаривать право
- оспаривать решение суда
- оспаривать сделку
- оспаривать чьи-л полномочия
- оспаривать чью-л компетенцию -
5 нападки напад·ки
attacks, assaultsвыступать в печати с нападками — to attack (smb.) in the press
отражать нападки — to rebuff (smb.'s) attacks
подвергать нападкам — to assail, to assault, to attack
подвергаться нападкам — to come under attacks, to be subjected to (smb.'s) attacks
служить мишенью нападок перен. — to be under fire
См. также в других словарях:
Malicious Intent — Studio album by Razor Released April 1986 … Wikipedia
Malicious Intent — Album par Razor Sortie 1986 Enregistrement Waxworks Studios, St. Jacobs, Ontario, Canada Durée 35:38 (Sans K.M.A. Et Mosh) Genre Speed/Thrash M … Wikipédia en Français
Malicious Records — was a German black metal and related record label run by Gerrit Weiher. The label has been defunct since 1997. Most of the bands are from Norway Pure Black Metal roots. There is only little information about this label, because there is no… … Wikipedia
The Malicious Practices Act 1933 — The Malicious Practices Act was passed on the 21st March 1933 in Nazi Germany. It was part of a series of events that occurred within 1933, which marked the brutality and resilience of the Nazi party. From here on life for thousands of Germans… … Wikipedia
Format string attack — Format string attacks are a class of software vulnerability discovered around 1999. Previously thought harmless, Format string attacks can be used to crash a program or to execute harmful code. The problem stems from the use of unfiltered user… … Wikipedia
IDN homograph attack — The internationalized domain name (IDN) homograph attack is a means by which a malicious party may seek to deceive computer users about what remote system they are communicating with, by exploiting the fact that many different characters may have … Wikipedia
DHCP Starvation Attack — Als DHCP Starvation Attack wird ein Angriff auf ein Computernetzwerk bezeichnet, bei dem der gesamte Bereich verfügbarer und durch DHCP vergebener IP Adressen auf einen einzigen Client registriert werden. Die automatische Zuweisung von… … Deutsch Wikipedia
Collision attack — In cryptography, a collision attack on a cryptographic hash tries to find two arbitrary inputs that will produce the same hash value, i.e. a hash collision. In contrast to a preimage attack, neither the hash value nor one of the inputs is… … Wikipedia
Zero day attack — A zero day (or zero hour) attack or threat is a computer threat that tries to exploit unknown, undisclosed or patchfree computer application vulnerabilities. The term Zero Day is also used to describe unknown or Zero day viruses. Zero day… … Wikipedia
Return-to-libc attack — A return to libc attack is a computer security attack usually starting with a buffer overflow in which the return statement on the stack is replaced by the address of another instruction and an additional portion of the stack is overwritten to… … Wikipedia
UDP flood attack — A UDP flood attack is a denial of service (DoS) attack using the User Datagram Protocol (UDP), a sessionless/connectionless computer networking protocol. Using UDP for denial of service attacks is not as straightforward as with the Transmission… … Wikipedia