Similar words: officious, judicious, pernicious, suspicious, capricious, avariciously, precious, specious. Meaning: [mə'lɪʃəs] adj. having the nature of or resulting from malice.
Random good picture Not show
151. Not only does it protect you from malicious surprises, it helps make sure that you start with a clean slate so that your new data isn't blended with a previous user's data.
152. Mirthless high malicious laughter.
153. Application Integrity Control can prevent the possible substitution of the components of your applications for malicious code.
154. Mr. Chen's malicious remark is a stab in the back.
155. With this information in the credential exchanges, services are able to better protect against malicious use of credential challenge responses that might have been improperly obtained.
156. Even though a malicious third party could steal a message, it cannot re-send it to some party unless it can break the SSL client/server authentication.
157. it's someone trying to make malicious use of a command-line executable.
158. The only difference is that the malicious attack comes through telephone lines and across network connections.
159. We face a veritable mountain of lies most dishonest and malicious lies.
160. The astronomers from Minnesota, who planted this mishmash of malicious misinformation into the press late last week, must now be rubbing their hands together with glee.
161. All articles are edited by a professional team of editors, so ensuring that the articles contain no malicious or libelous content and as few inaccuracies as possible.
162. In real life, there are scientific and goodwill cloning, but also exists unwisdom, malicious parody manufacturing.
163. Payload: Downloads potentially malicious code on to the compromised computer.
164. Distribution channels include email, malicious or hacked Web pages, Internet Relay Chat (IRC), peer-to-peer networks, etc.sentencedict.com/malicious.html
165. And malicious software could corrupt or erase files on the external drive.
166. The girls were snorting coke in the dressing room, and the bouncers seemed more malicious and oversexed than the customers.
167. Non-repudiation guarantees that no malicious sender can later disavow having created and sent a specific message.
168. Figure 1 gives a diagrammatic representation of the steps in analysing a binary statically for the presence of malicious behaviour.
169. If you check the user's credentials on the index page only, a malicious user could directly enter a URL to a "deeper" page, which would bypass this credential checking process.
170. But we don't permit hate speech which contains slurs or the malicious use of stereotypes intended to attack or demean a particular gender, sexual orientation, race, religion, or nationality.
171. He spread embroidered stories and malicious gossip . I just ignored them.
172. It means to take spiteful , malicious delight in the misfortune of others.
173. He describes her as “excitable, malicious, malignant, vengeful, unforgiving, selfish, stingy, avaricious, coarse, vulgar, profane, obscene, a furious blusterer on the outside and at heart a coward.”
174. An unauthorized user or unauthorized program, generally considered to have malicious intent, on a computer or computer network.
175. The false civil procedure as a new malicious use of the courts and in fraud of law in our country, have yet to be clearly defined, litigation academic study on this issue is still in the intial stage.
176. Here it is:"As we've said from the beginning, it's sad that someone would fabricate such a malicious, defamatory, and demonstrably false claim.
177. This cape buffalo is a vicious beast that charges at humans seemingly for fun. Big game hunters cherish them for their malicious history.
178. The untrusted data is referred to as tainted data, while the code ensuring that the data is not malicious is called a sanitizer, and is often said to clean the taint.
179. Heretofore all the campus gossip had seemed merely malicious and disrespectful.
180. Hackers can take advantage of the advances in cryptanalysis or malicious instance resources to render cryptographic algorithms insecure.
More similar words: officious, judicious, pernicious, suspicious, capricious, avariciously, precious, specious, capacious, salacious, sagacious, fallacious, vivacious, conscious, audacious, atrocious, ferocious, voracious, pugnacious, precocious, mendacious, loquacious, solicitous, voraciously, consciously, unconscious, subconscious, duplicitous, perspicacious, licentious.