{"ach":"
Pot buk ma kicobo temo keto purugram ma kwalo ngec pa dano, tii ki komputa mamegi me cobo jo mukene, onyo balo tic mamegi.<\/p>
Pot buk mogo gabo purugram mabalo tic tektek, ento mogo time labongo ngec onyo twero ki bot wegi gi.<\/p>","af":"
Aanvalsbladsye probeer programme installeer wat private inligting steel, u rekenaar gebruik om ander aan te val, of u stelsel beskadig.<\/p>
Sommige aanvalsbladsye versprei doelbewus skadelike sagteware, maar baie word oorgeneem sonder die wete of toestemming van hulle eienaars.<\/p>","an":"
Os puestos enrestidors miran d'instalar programas que rapan informaci\u00f3n privada, fan servir o suyo ordinador ta enrestir atros u fer mal a o suyo sistema.<\/p>
Qualques puestos enrestidors distribuyen intencionalment software maligno, pero muitos son compromesos sin a conoixencia u permiso d'os suyos propietarios.<\/p>","ar":"
\u062a\u062d\u0627\u0648\u0644 \u0645\u0648\u0627\u0642\u0639 \u0627\u0644\u0647\u062c\u0645\u0627\u062a \u062a\u0646\u0635\u064a\u0628 \u0628\u0631\u0627\u0645\u062c \u062a\u0633\u0631\u0642 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a \u0627\u0644\u0634\u062e\u0635\u064a\u0629\u060c \u0623\u0648 \u0627\u0633\u062a\u062e\u062f\u0627\u0645 \u062d\u0627\u0633\u0648\u0628\u0643 \u0644\u0644\u0647\u062c\u0648\u0645 \u0639\u0644\u0649 \u0627\u0644\u0622\u062e\u0631\u064a\u0646\u060c \u0623\u0648 \u0625\u064a\u0630\u0627\u0621 \u062d\u0627\u0633\u0648\u0628\u0643.<\/p>
\u062a\u0648\u0632\u0651\u0639 \u0628\u0639\u0636 \u0645\u0648\u0627\u0642\u0639 \u0627\u0644\u0647\u062c\u0645\u0627\u062a \u0627\u0644\u0628\u0631\u0627\u0645\u062c \u0627\u0644\u0645\u0634\u0628\u0648\u0647\u0629 \u0628\u0634\u0643\u0644 \u0645\u0642\u0635\u0648\u062f\u060c \u0648\u0644\u0643\u0646 \u0627\u0644\u0643\u062b\u064a\u0631 \u0645\u0646\u0647\u0627 \u0645\u062e\u062a\u0631\u0642 \u062f\u0648\u0646 \u0639\u0644\u0645 \u0623\u0648 \u0625\u0630\u0646 \u0623\u0635\u062d\u0627\u0628\u0647\u0627.<\/p>","ast":"
Les p\u00e1xines atacantes tenten d'usar el to ordenador p'atacar a otros, marafundiar informaci\u00f3n privada o da\u00f1ar el to sistema.<\/p>
Delles p\u00e1xines atacantes distrib\u00fain arr\u00e9 software da\u00f1ible pero munches t\u00e1n compromet\u00edes ensin la conocencia o permisu de los sos due\u00f1os.<\/p>","az":"
H\u00fccum sayt\u0131 olaraq g\u00f6st\u0259ril\u0259n saytlar \u015f\u0259xsi m\u0259lumatlar\u0131n\u0131z\u0131 o\u011furlayan, komputerinizi ba\u015fqalar\u0131na h\u00fccum etm\u0259k\u00e7\u00fcn istifad\u0259 etm\u0259k m\u0259qs\u0259di il\u0259 istifad\u0259 ed\u0259n ya da sisteminiz\u0259 z\u0259r\u0259r ver\u0259c\u0259k proqramlar\u0131 qura\u015fd\u0131rma\u011fa \u00e7al\u0131\u015fan saytlard\u0131r.<\/p>
B\u0259zi h\u00fccum saytlar\u0131 z\u0259r\u0259rli proqramlar\u0131 bil\u0259r\u0259k yayark\u0259n, \u0259ks\u0259r saytlar, sahibinin m\u0259lumat\u0131 v\u0259 icaz\u0259si olmadan bu m\u0259qs\u0259dl\u0259 istifad\u0259 edilir.<\/p>","be":"
\u041d\u0430\u043f\u0430\u0434\u043d\u044b\u044f \u0441\u0442\u0430\u0440\u043e\u043d\u043a\u0456 \u0441\u043f\u0440\u0430\u0431\u0443\u044e\u0446\u044c \u0443\u0441\u0442\u0430\u043b\u0451\u045e\u0432\u0430\u0446\u044c \u043f\u0440\u0430\u0433\u0440\u0430\u043c\u044b, \u044f\u043a\u0456\u044f \u043a\u0440\u0430\u0434\u0443\u0446\u044c \u0430\u0441\u0430\u0431\u0456\u0441\u0442\u044b\u044f \u0437\u0432\u0435\u0441\u0442\u043a\u0456, \u0441\u043a\u0430\u0440\u044b\u0441\u0442\u043e\u045e\u0432\u0430\u044e\u0446\u044c \u0432\u0430\u0448 \u043a\u0430\u043c\u043f\u0443\u0442\u0430\u0440, \u043a\u0430\u0431 \u043d\u0430\u043f\u0430\u0434\u0430\u0446\u044c \u043d\u0430 \u0456\u043d\u0448\u044b\u044f, \u0430\u0431\u043e \u043f\u0441\u0443\u044e\u0446\u044c \u0432\u0430\u0448\u0443 \u0441\u0456\u0441\u0442\u044d\u043c\u0443.<\/p>
\u0410\u0441\u043e\u0431\u043d\u044b\u044f \u043d\u0430\u043f\u0430\u0434\u043d\u044b\u044f \u0441\u0442\u0430\u0440\u043e\u043d\u043a\u0456 \u043d\u0430\u045e\u043c\u044b\u0441\u043d\u0430 \u0440\u0430\u0441\u043f\u0430\u045e\u0441\u044e\u0434\u0436\u0432\u0430\u044e\u0446\u044c \u0448\u043a\u043e\u0434\u043d\u044b\u044f \u043f\u0440\u0430\u0433\u0440\u0430\u043c\u044b, \u0448\u043c\u0430\u0442 \u0437 \u044f\u043a\u0456\u0445 \u043f\u0435\u0440\u0430\u043a\u0440\u0443\u0447\u0430\u043d\u044b \u0431\u0435\u0437 \u0432\u0435\u0434\u0430\u043c\u0443 \u0456 \u0434\u0430\u0437\u0432\u043e\u043b\u0443 \u0456\u0445 \u0443\u043b\u0430\u0434\u0430\u043b\u044c\u043d\u0456\u043a\u0430\u045e.<\/p>","bg":"
\u0410\u0442\u0430\u043a\u0443\u0432\u0430\u0449\u0438\u0442\u0435 \u0441\u0442\u0440\u0430\u043d\u0438\u0446\u0438 \u0441\u0435 \u043e\u043f\u0438\u0442\u0432\u0430\u0442 \u0434\u0430 \u0438\u043d\u0441\u0442\u0430\u043b\u0438\u0440\u0430\u0442 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u0438, \u043a\u043e\u0438\u0442\u043e \u043a\u0440\u0430\u0434\u0430\u0442 \u043b\u0438\u0447\u043d\u0430 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f, \u043f\u043e\u0432\u0440\u0435\u0436\u0434\u0430\u0442 \u043a\u043e\u043c\u043f\u044e\u0442\u044a\u0440\u0430 \u0432\u0438 \u0438\u043b\u0438 \u0433\u043e \u0438\u0437\u043f\u043e\u043b\u0437\u0432\u0430\u0442 \u0437\u0430 \u0430\u0442\u0430\u043a\u0430 \u043d\u0430 \u0434\u0440\u0443\u0433\u0438 \u043a\u043e\u043c\u043f\u044e\u0442\u0440\u0438.<\/p>
\u041d\u044f\u043a\u043e\u0438 \u043e\u0442 \u0442\u0435\u0437\u0438 \u0441\u0442\u0440\u0430\u043d\u0438\u0446\u0438 \u0433\u043e \u043f\u0440\u0430\u0432\u044f\u0442 \u0441\u044a\u0437\u043d\u0430\u0442\u0435\u043b\u043d\u043e, \u043d\u043e \u043c\u043d\u043e\u0433\u043e \u0441\u0430 \u043f\u0440\u043e\u0441\u0442\u043e \u0436\u0435\u0440\u0442\u0432\u0430 \u0438 \u0441\u043e\u0431\u0441\u0442\u0432\u0435\u043d\u0438\u0446\u0438\u0442\u0435 \u0438\u043c \u043d\u0435 \u0437\u043d\u0430\u044f\u0442 \u043d\u0438\u0449\u043e \u0437\u0430 \u0442\u043e\u0432\u0430.<\/p>","bn":"
\u0986\u0995\u09cd\u09b0\u09ae\u09a3\u0995\u09be\u09b0\u09c0 \u09aa\u09be\u09a4\u09be \u09a4\u09a5\u09cd\u09af \u099a\u09c1\u09b0\u09bf \u0995\u09b0\u09a4\u09c7 \u09aa\u09cd\u09b0\u09cb\u0997\u09cd\u09b0\u09be\u09ae \u0987\u09a8\u09cd\u09b8\u099f\u09b2 \u0995\u09b0\u09be\u09b0 \u099a\u09c7\u09b7\u09cd\u099f\u09be \u0995\u09b0\u09c7, \u0985\u09a8\u09cd\u09af \u0995\u09ae\u09cd\u09aa\u09bf\u0989\u099f\u09be\u09b0\u0995\u09c7 \u0986\u0995\u09cd\u09b0\u09ae\u09a8 \u0995\u09b0\u09a4\u09c7 \u0986\u09aa\u09a8\u09be\u09b0 \u0995\u09ae\u09cd\u09aa\u09bf\u099f\u09be\u09b0 \u09ac\u09cd\u09af\u09ac\u09b9\u09be\u09b0 \u0995\u09b0\u09c7, \u09ac\u09be \u0986\u09aa\u09a8\u09be\u09b0 \u09b8\u09bf\u09b8\u09cd\u099f\u09c7\u09ae \u09a7\u09cd\u09ac\u0982\u09b8 \u0995\u09b0\u09c7\u0964<\/p>
\u0995\u09bf\u099b\u09c1 \u0986\u0995\u09cd\u09b0\u09ae\u09a3\u0995\u09be\u09b0\u09c0 \u09aa\u09be\u09a4\u09be \u0987\u099a\u09cd\u099b\u09be\u0995\u09c3\u09a4 \u09ad\u09be\u09ac\u09c7 \u0995\u09cd\u09b7\u09a4\u09bf\u0995\u09b0 \u09b8\u09ab\u099f\u0993\u09df\u09cd\u09af\u09be\u09b0 \u09ac\u09bf\u09a4\u09b0\u09a3 \u0995\u09b0\u09c7, \u0995\u09bf\u09a8\u09cd\u09a4\u09c1 \u0985\u09a8\u09c7\u0995\u09c7 \u09a8\u09be \u09ac\u09c1\u099d\u09c7\u0987 \u098f\u0997\u09c1\u09b2\u09cb\u0995\u09c7 \u0995\u09be\u099c \u0995\u09b0\u09a4\u09c7 \u0985\u09a8\u09c1\u09ae\u09cb\u09a6\u09a8 \u09a6\u09c7\u09df\u0964<\/p>","br":"
Ar pajenno\u00f9 tagus a glask stalia\u00f1 goulevio\u00f9 da laerezh titouro\u00f9 personel, da arvera\u00f1 hoc'h urzhiataer evit taga\u00f1 urzhiataerio\u00f9 all pe da vekaat ho reizhiad.<\/p>
Ul lod eus ar pajenno\u00f9-tagus-ma\u00f1 a zasparzh mezianto\u00f9 pistrius koulskoude ez eo diefedus un darn vras anezho hep gouiziegezh pe aotre o ferc'hennerion.<\/p>","bs":"
Napada\u010dke stranice poku\u0161avaju instalirati programe koji kradu privatne informacije, koriste va\u0161 ra\u010dunar da napadnu druge, ili \u0161tete va\u0161em sistemu.<\/p>
Neke napada\u010dke stranice namjerno distribuiraju \u0161tetan softver, ali mnoge su kompromitovane bez znanja njihovih vlasnika.<\/p>","ca":"
Els llocs atacants proven d'instal\u00b7lar programari que roba informaci\u00f3 privada, utilitzen el vostre ordinador per atacar-ne d'altres, o fan malb\u00e9 el vostre sistema.<\/p>
Alguns llocs atacants distribueixen de forma intencionada programari maligne, tot i que molts estan compromesos sense el coneixement o perm\u00eds dels propietaris.<\/p>","cak":"
Ri eleq'oma' taq ruxaq k'amaya'l nikitojtob'ej nikiy\u00e4k jun kema', ri nitik\u00efr nreleq'aj awetamab'al, nrokisaj re asamajib'al richin nritzelaj ri aq'inoj.<\/p>
Jujun taq ruxaq k'amaya'l jutaqil nikitaluj itzel taq kema', xa xe chi e k'\u00efy ri nikiq'ab'aj tzij ruma man awetaman ta chi chuqa' ya'on q'ij chi ke kuma ri kajaw pan ew\u00e4l.<\/p>","cs":"
\u00dato\u010dn\u00e9 str\u00e1nky se pokou\u0161\u00ed nainstalovat programy, kter\u00e9 kradou va\u0161e d\u016fv\u011brn\u00e1 data, pou\u017e\u00edvaj\u00ed v\u00e1\u0161 po\u010d\u00edta\u010d k dal\u0161\u00edm \u00fatok\u016fm, nebo jakkoliv poni\u010d\u00ed v\u00e1\u0161 syst\u00e9m.<\/p>
N\u011bkter\u00e9 str\u00e1nky poskytuj\u00ed \u0161kodliv\u00fd software z\u00e1m\u011brn\u011b, \u0159ada z nich byla ale sama napadena a \u010din\u00ed tak bez v\u011bdom\u00ed jejich vlastn\u00edk\u016f.<\/p>","cy":"
Mae tudalennau ymosod yn ceisio gosod rhaglenni sy'n dwyn gwybodaeth breifat, defnyddio eich cyfrifiadur i ymosod ar eraill, neu ddifrodi eich system.<\/p>
Mae rhai tudalennau ymosod yn fwriadol yn dosbarthu meddalwedd niweidiol, ond mae llawer yn cael eu cyfaddawdu heb yn wybod neu ganiat\u00e2d eu perchnogion.<\/p>","da":"
Angrebswebsteder fors\u00f8ger at installere software, som stj\u00e6ler private oplysninger, bruger din computer til at angribe andre, eller skader dit system.<\/p>
Nogle angrebswebsteder distribuerer med forts\u00e6t skadelig software, men mange andre er kompromitteret uden viden eller accept fra webstedets ejere.<\/p>","de":"
Attackierende Webseiten versuchen, Programme zu installieren, die private Informationen stehlen, Ihren Computer verwenden, um andere zu attackieren, oder Ihr System besch\u00e4digen.<\/p>
Manche Webseiten vertreiben bewusst Viren und \u00e4hnlich sch\u00e4dliche Software, aber viele Webseiten sind auch ohne das Wissen oder die Erlaubnis des Betreibers kompromittiert.<\/p>","dsb":"
Napadowe boki wopytuju programy instal\u011browa\u015b, k\u00f3tare\u017e k\u0161adnu priwatne informacije, wu\u017eywaju wa\u0161o licad\u0142o, aby druge napadnuli abo wa\u0161 system wob\u0161k\u00f3\u017aeli.<\/p>
N\u011bkotare napadowe boki rozd\u017a\u011bluju z w\u00f3tgl\u011bdom \u0161k\u00f3dnu softwaru, ale wjele wobgrozujo se b\u017aez w\u011b\u017aenja abo dow\u00f3lnos\u0107i jich wobsej\u017aarjow.<\/p>","el":"
\u039f\u03b9 \u03b9\u03c3\u03c4\u03bf\u03c3\u03b5\u03bb\u03af\u03b4\u03b5\u03c2 \u03b5\u03c0\u03b9\u03b8\u03ad\u03c3\u03b5\u03c9\u03bd \u03c0\u03c1\u03bf\u03c3\u03c0\u03b1\u03b8\u03bf\u03cd\u03bd \u03bd\u03b1 \u03b5\u03b3\u03ba\u03b1\u03c4\u03b1\u03c3\u03c4\u03ae\u03c3\u03bf\u03c5\u03bd \u03c0\u03c1\u03bf\u03b3\u03c1\u03ac\u03bc\u03bc\u03b1\u03c4\u03b1 \u03c3\u03c4\u03bf\u03bd \u03c5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ae \u03c3\u03b1\u03c2 \u03c4\u03b1 \u03bf\u03c0\u03bf\u03af\u03b1 \u03c5\u03c0\u03bf\u03ba\u03bb\u03ad\u03c0\u03c4\u03bf\u03c5\u03bd \u03c0\u03c1\u03bf\u03c3\u03c9\u03c0\u03b9\u03ba\u03ad\u03c2 \u03c3\u03b1\u03c2 \u03c0\u03bb\u03b7\u03c1\u03bf\u03c6\u03bf\u03c1\u03af\u03b5\u03c2, \u03c7\u03c1\u03b7\u03c3\u03b9\u03bc\u03bf\u03c0\u03bf\u03b9\u03bf\u03cd\u03bd \u03c4\u03bf\u03bd \u03c5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ae \u03c3\u03b1\u03c2 \u03b3\u03b9\u03b1 \u03bd\u03b1 \u03b5\u03c0\u03b9\u03c4\u03af\u03b8\u03b5\u03bd\u03c4\u03b1\u03b9 \u03c3\u03b5 \u03ac\u03bb\u03bb\u03bf\u03c5\u03c2 \u03c5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ad\u03c2 \u03ba\u03b1\u03b9 \u03b2\u03bb\u03ac\u03c0\u03c4\u03bf\u03c5\u03bd \u03c4\u03bf \u03c3\u03cd\u03c3\u03c4\u03b7\u03bc\u03b1 \u03c3\u03b1\u03c2.<\/p>
\u039c\u03b5\u03c1\u03b9\u03ba\u03ad\u03c2 \u03b9\u03c3\u03c4\u03bf\u03c3\u03b5\u03bb\u03af\u03b4\u03b5\u03c2 \u03b5\u03b3\u03ba\u03b1\u03b8\u03b9\u03c3\u03c4\u03bf\u03cd\u03bd \u03b5\u03c0\u03af\u03c4\u03b7\u03b4\u03b5\u03c2 \u03ba\u03b1\u03ba\u03cc\u03b2\u03bf\u03c5\u03bb\u03bf \u03bb\u03bf\u03b3\u03b9\u03c3\u03bc\u03b9\u03ba\u03cc, \u03b1\u03bb\u03bb\u03ac \u03c3\u03b5 \u03b1\u03c1\u03ba\u03b5\u03c4\u03ad\u03c2 \u03b1\u03c5\u03c4\u03cc \u03b3\u03af\u03bd\u03b5\u03c4\u03b1\u03b9 \u03c7\u03c9\u03c1\u03af\u03c2 \u03c4\u03b7\u03bd \u03b3\u03bd\u03ce\u03c3\u03b7 \u03ae \u03c4\u03b7\u03bd \u03c3\u03c5\u03b3\u03ba\u03b1\u03c4\u03ac\u03b8\u03b5\u03c3\u03b7 \u03c4\u03c9\u03bd \u03b9\u03b4\u03b9\u03bf\u03ba\u03c4\u03b7\u03c4\u03ce\u03bd \u03c4\u03bf\u03c5\u03c2.<\/p>","en-CA":"
Attack pages try to install programs that steal private information, use your computer to attack others, or damage your system.<\/p>
Some attack pages intentionally distribute harmful software, but many are compromised without the knowledge or permission of their owners.<\/p>","en-GB":"
Attack pages try to install programs that steal private information, use your computer to attack others, or damage your system.<\/p>
Some attack pages intentionally distribute harmful software, but many are compromised without the knowledge or permission of their owners.<\/p>","en-US":"
Attack pages try to install programs that steal private information, use your computer to attack others, or damage your system.<\/p>
Some attack pages intentionally distribute harmful software, but many are compromised without the knowledge or permission of their owners.<\/p>","eo":"
Atakaj retejoj klopodas instali programojn kiuj \u015dtelas privatajn informojn, uzas vian komputilon por ataki aliajn a\u016d difektas vian sistemon.<\/p>
Kelkaj retejoj intence distribuas difektan programaron, sed multaj estas uzataj sen la scio a\u016d permeso de \u011diaj posedantoj.<\/p>","es-AR":"
Las p\u00e1ginas de ataque tratan de instalar programas que roban informaci\u00f3n privada, usan su computadora para atacar otras o da\u00f1an su sistema.<\/p>
Algunas p\u00e1ginas de ataque intencionalmente distribuyen software da\u00f1ino, pero muchas est\u00e1n comprometidas sin el conocimiento o permiso de sus due\u00f1os.<\/p>","es-CL":"
Las p\u00e1ginas maliciosas intentan instalar programas que roban informaci\u00f3n privada, usan tu computador para atacar a otras, o da\u00f1ar tu sistema<\/p>
Algunas p\u00e1ginas fraudulentas distribuyen intencionalmente programas perjudiciales, pero muchas se ven comprometidas sin el conocimiento o permiso de sus due\u00f1os.<\/p>","es-ES":"
Los sitios atacantes intentan instalar programas que pueden robar informaci\u00f3n privada, usar su equipo para atacar otros o da\u00f1ar su sistema.<\/p>
Algunos sitios atacantes distribuyen intencionalmente software da\u00f1ino, pero muchos son comprometidos sin el conocimiento o permiso de sus propietarios.<\/p>","es-MX":"
Las p\u00e1ginas atacantes intentan instalar programas para robarte informaci\u00f3n privada, usar tu equipo para atacar a otros o da\u00f1ar tu sistema.<\/p>
Algunas distribuyen intencionalmente programas da\u00f1inos y otras fueron comprometidas sin el conocimiento de sus due\u00f1os.<\/p>","et":"
R\u00fcndavad lehed \u00fcritavad paigaldada privaatandmeid varastavaid rakendusi, kasutavad sinu arvutit teiste r\u00fcndamiseks v\u00f5i kahjustavad sinu arvutit.<\/p>
M\u00f5ned r\u00fcndavad lehed jagavad tahtlikult kahjulikku tarkvara, teised teevad seda aga omaniku teadmata v\u00f5i omanikult luba k\u00fcsimata.<\/p>","eu":"
Zure informazio pertsonala ostu, zure ordenagailua besteei erasotzeko erabili edo zure sistema kaltetzeko programak instalatzen saiatzen dira orri erasotzaileak.<\/p>
Zenbait orri erasotzailek nahita banatzen dute software kaltegarria baina, beste askok, jabeak jakinaren gainean egon gabe banatzen dute.<\/p>","fa":"
\u0635\u0641\u062d\u0647\u200c\u0647\u0627\u06cc \u062a\u0647\u0627\u062c\u0645\u06cc \u062a\u0644\u0627\u0634 \u0645\u06cc\u200c\u06a9\u0646\u0646\u062f \u0628\u0631\u0646\u0627\u0645\u0647\u200c\u0647\u0627\u06cc\u06cc \u0646\u0635\u0628 \u06a9\u0646\u0646\u062f \u06a9\u0647 \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u062e\u0635\u0648\u0635\u06cc \u0631\u0627 \u0633\u0631\u0642\u062a \u0645\u06cc\u200c\u06a9\u0646\u0646\u062f\u060c \u0627\u0632 \u0631\u0627\u06cc\u0627\u0646\u0647\u0654 \u0634\u0645\u0627 \u0628\u0631\u0627\u06cc \u062d\u0645\u0644\u0647 \u0628\u0647 \u062f\u06cc\u06af\u0631\u0627\u0646 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u06cc\u200c\u06a9\u0646\u0646\u062f\u060c \u06cc\u0627 \u0628\u0647 \u0622\u0646 \u0622\u0633\u06cc\u0628 \u0645\u06cc\u200c\u0632\u0646\u0646\u062f.<\/p>
\u0628\u0631\u062e\u06cc \u0635\u0641\u062d\u0647\u200c\u0647\u0627\u06cc \u062a\u0647\u0627\u062c\u0645\u06cc \u0639\u0645\u062f\u0627\u064b \u0628\u0647 \u067e\u062e\u0634 \u0646\u0631\u0645\u200c\u0627\u0641\u0632\u0627\u0631\u0647\u0627\u06cc \u0632\u06cc\u0627\u0646\u200c\u0628\u0627\u0631 \u0645\u06cc\u200c\u067e\u0631\u062f\u0627\u0632\u0646\u062f\u060c \u0648\u0644\u06cc \u0628\u0633\u06cc\u0627\u0631\u06cc \u0627\u0632 \u0622\u0646\u200c\u0647\u0627 \u0628\u062f\u0648\u0646 \u0627\u0637\u0644\u0627\u0639 \u0648 \u0645\u062c\u0648\u0632 \u0635\u0627\u062d\u0628\u0627\u0646\u0634\u0627\u0646 \u062a\u0635\u0627\u062d\u0628 \u06af\u0631\u062f\u06cc\u062f\u0647\u200c\u0627\u0646\u062f.<\/p>","ff":"
Kelle njangu eotoo ko aafde topir\u0257e gujjir\u0257e humpito maa suraango, kuutoroo ordinateer maa ngam yande e wo\u0257\u0253e, walla bonna yu\u0253\u0253o maa.<\/p>
Yoga e kelle njangu \u0257ee ena cara topir\u0257e bon\u0257e e teyre, kono keew\u0257e ko bonnooje tawa jey\u0257o-\u0257e oo anndaa walla yamiraani.<\/p>","fi":"
Hy\u00f6kk\u00e4yssivut yritt\u00e4v\u00e4t asentaa tietokoneellesi ohjelmia, jotka ker\u00e4\u00e4v\u00e4t henkil\u00f6tietoja, k\u00e4ytt\u00e4v\u00e4t tietokonettasi toisiin tietokoneisiin kohdistuviin hy\u00f6kk\u00e4yksiin tai muuten vahingoittavat tietokonettasi.<\/p>
Joidenkin sivujen tarkoituksena on levitt\u00e4\u00e4 t\u00e4llaisia vahingollisia ohjelmia, mutta useat sivut on valjastettu t\u00e4h\u00e4n ilman sivun omistajien tietoa tai lupaa.<\/p>","fr":"
Les pages malveillantes essaient d\u2019installer des programmes qui volent des informations personnelles, qui utilisent votre appareil pour en attaquer d\u2019autres ou qui endommagent votre syst\u00e8me.<\/p>
Certaines pages distribuent intentionnellement des logiciels malfaisants, mais beaucoup sont compromises sans la permission de leurs propri\u00e9taires ou sans qu\u2019ils en aient connaissance.<\/p>","fy-NL":"
Oanfalsiden probearje programma\u2019s te ynstallearjen dy't priveeynformaasje stelle, jo kompj\u00fbter br\u00fbke om oaren oan te fallen, of jo systeem skansearje.<\/p>
Guon oanfalsiden ferspriede bewust gefaarlike software, mar in protte binne kompromittearre s\u00fbnder de kunde of tastimming fan harren eigeners.<\/p>","ga-IE":"
D\u00e9anann leathanaigh ionsaithe iarracht r\u00edomhchl\u00e1ir a shuite\u00e1il a ghoideann faisn\u00e9is phr\u00edobh\u00e1ideach n\u00f3 a dh\u00e9anann dochar do do r\u00edomhaire.<\/p>
Scaipeann leathanaigh ionsaithe \u00e1irithe bogearra\u00ed dochracha d'aonturas, ach is minic su\u00edmh a bheith cont\u00fairteach i nganfhios d\u00e1 n-\u00fain\u00e9ir\u00ed agus gan a gcead.<\/p>","gd":"
Feuchaidh duilleagan ionnsaighe ri pr\u00f2graman a st\u00e0ladh a ghoideas fiosrachadh pr\u00ecobhaideach ort, a chleachdas an coimpiutair agad gus ionnsaigh a thoirt air feadhainn eile no gus cron a chur air an inneal agad.<\/p>
Tha cuid dhe na duilleagan ionnsaighe a\u2019 sgaoileadh bathar-bog cronail a dh\u2019aona-ghnothach ach tha torr dhiubh gan cur gu m\u00ec-fheum gun fhios is gun chead nan sealbhadairean aca.<\/p>","gl":"
Os sitios de ataque tentan instalar programas que rouban informaci\u00f3n privada, que utilizan o computador para atacar a terceiros ou que danan o sistema.<\/p>
Alg\u00fans deles distrib\u00faen de forma intencionada software pernicioso, mais moitos comprom\u00e9tense sen o permiso ou co\u00f1ecemento dos propietarios.<\/p>","gn":"
Umi tenda hekomar\u00e3va o\u00f1eha'\u00e3 omohenda tembiaporape ikat\u00fava omonda marandu \u00f1emigua, oipuru ne mohendaha omoapa\u00f1u\u00e3i hag\u0303ua ambu\u00e9pe t\u00e9r\u00e3 ombyai nde apopyvusu.<\/p>
O\u0129kuaa tenda hekomar\u00e3va omyas\u00e3i oipotait\u00e9gui software imar\u00e3va, h\u00e1katu heta ko'\u00e3va rehegua oiko oikuaa'\u1ef9re t\u00e9r\u00e3 omone\u0129'\u1ef9re ijaraku\u00e9ra.<\/p>","gu-IN":"
\u0ab9\u0ac1\u0aae\u0ab2\u0abe \u0aaa\u0abe\u0aa8\u0abe\u0a82\u0a93 \u0a95\u0abe\u0ab0\u0acd\u0aaf\u0a95\u0acd\u0ab0\u0aae\u0acb \u0a87\u0aa8\u0acd\u0ab8\u0acd\u0a9f\u0acb\u0ab2 \u0a95\u0ab0\u0ab5\u0abe\u0aa8\u0acb \u0aaa\u0acd\u0ab0\u0aaf\u0abe\u0ab8 \u0a95\u0ab0\u0ac7 \u0a9b\u0ac7 \u0a95\u0ac7 \u0a9c\u0ac7 \u0a96\u0abe\u0aa8\u0a97\u0ac0 \u0a9c\u0abe\u0aa3\u0a95\u0abe\u0ab0\u0ac0 \u0a9a\u0acb\u0ab0\u0ac7 \u0a9b\u0ac7, \u0aa4\u0aae\u0abe\u0ab0\u0abe \u0a95\u0aae\u0acd\u0aaa\u0acd\u0aaf\u0ac2\u0a9f\u0ab0\u0aa8\u0acb \u0a89\u0aaa\u0aaf\u0acb\u0a97 \u0aac\u0ac0\u0a9c\u0abe\u0a93 \u0aaa\u0ab0 \u0ab9\u0ac1\u0aae\u0ab2\u0abe \u0a95\u0ab0\u0ab5\u0abe \u0aae\u0abe\u0a9f\u0ac7 \u0a95\u0ab0\u0ac7, \u0a85\u0aa5\u0ab5\u0abe \u0aa4\u0aae\u0abe\u0ab0\u0ac0 \u0ab8\u0abf\u0ab8\u0acd\u0a9f\u0aae\u0aa8\u0ac7 \u0aaa\u0aa3 \u0aad\u0abe\u0a82\u0a97\u0ac0 \u0ab6\u0a95\u0ac7 \u0a9b\u0ac7.<\/p>
\u0a85\u0aae\u0ac1\u0a95 \u0ab9\u0ac1\u0aae\u0ab2\u0abe \u0aaa\u0abe\u0aa8\u0abe\u0a82\u0a93 \u0ab9\u0ac7\u0aa4\u0ac1\u0ab8\u0ab0 \u0aa8\u0ac1\u0a95\u0ab8\u0abe\u0aa8\u0a95\u0abe\u0ab0\u0a95 \u0ab8\u0acb\u0aab\u0acd\u0a9f\u0ab5\u0ac7\u0ab0 \u0ab5\u0abf\u0aa4\u0ab0\u0ac7 \u0a9b\u0ac7, \u0aaa\u0aa3 \u0a98\u0aa3\u0abe\u0aac\u0aa7\u0abe \u0aa4\u0ac7\u0aae\u0aa8\u0abe \u0aae\u0abe\u0ab2\u0abf\u0a95\u0acb\u0aa8\u0ac0 \u0a9c\u0abe\u0aa3\u0a95\u0abe\u0ab0\u0ac0 \u0a95\u0ac7 \u0aaa\u0ab0\u0ab5\u0abe\u0aa8\u0a97\u0ac0 \u0ab5\u0abf\u0aa8\u0abe \u0aac\u0a97\u0abe\u0aa1\u0ab5\u0abe\u0aae\u0abe\u0a82 \u0a86\u0ab5\u0ac7\u0ab2\u0abe \u0ab9\u0acb\u0aaf \u0a9b\u0ac7.<\/p>","he":"
\u05d3\u05e4\u05d9 \u05ea\u05e7\u05d9\u05e4\u05d4 \u05de\u05e0\u05e1\u05d9\u05dd \u05dc\u05d4\u05ea\u05e7\u05d9\u05df \u05ea\u05d5\u05db\u05e0\u05d5\u05ea \u05e9\u05d2\u05d5\u05e0\u05d1\u05d5\u05ea \u05e0\u05ea\u05d5\u05e0\u05d9\u05dd \u05e4\u05e8\u05d8\u05d9\u05d9\u05dd, \u05e2\u05d5\u05e9\u05d5\u05ea \u05e9\u05d9\u05de\u05d5\u05e9 \u05d1\u05de\u05d7\u05e9\u05d1 \u05e9\u05dc\u05da \u05db\u05d3\u05d9 \u05dc\u05ea\u05e7\u05d5\u05e3 \u05d0\u05d7\u05e8\u05d9\u05dd, \u05d0\u05d5 \u05d1\u05e4\u05d5\u05d2\u05e2\u05d5\u05ea \u05d1\u05de\u05e2\u05e8\u05db\u05ea \u05e9\u05dc\u05da.<\/p>
\u05d7\u05dc\u05e7 \u05de\u05d3\u05e4\u05d9 \u05d4\u05ea\u05e7\u05d9\u05e4\u05d4 \u05de\u05e4\u05d9\u05e6\u05d9\u05dd \u05d1\u05db\u05d5\u05d5\u05e0\u05d4 \u05ea\u05d5\u05db\u05e0\u05d5\u05ea \u05de\u05e1\u05d5\u05db\u05e0\u05d5\u05ea, \u05d1\u05e2\u05d5\u05d3 \u05d3\u05e4\u05d9\u05dd \u05d0\u05d7\u05e8\u05d9\u05dd \u05e9\u05d5\u05d1\u05e9\u05d5 \u05dc\u05dc\u05d0 \u05d9\u05d3\u05d9\u05e2\u05ea \u05d1\u05e2\u05dc\u05d9 \u05d4\u05d0\u05ea\u05e8 \u05d0\u05d5 \u05d1\u05d4\u05e1\u05db\u05de\u05ea\u05dd.<\/p>","hi-IN":"
\u092d\u0947\u0926\u094d\u092f \u092a\u0943\u0937\u094d\u0920 \u092a\u094d\u0930\u094b\u0917\u094d\u0930\u093e\u092e \u0938\u0902\u0938\u094d\u0925\u093e\u092a\u093f\u0924 \u0915\u0930\u0928\u0947 \u0915\u0940 \u0915\u094b\u0936\u093f\u0936 \u0915\u0930\u0924\u0947 \u0939\u0948\u0902 \u091c\u094b \u0928\u093f\u091c\u0940 \u0938\u0942\u091a\u0928\u093e\u0913\u0902 \u0915\u094b \u091a\u0941\u0930\u093e\u0924\u0947 \u0939\u0948\u0902, \u0906\u092a\u0915\u0947 \u0915\u092e\u094d\u092a\u094d\u092f\u0942\u091f\u0930 \u0915\u093e \u0909\u092a\u092f\u094b\u0917 \u0905\u0928\u094d\u092f \u0915\u094b \u092d\u0947\u0926\u0928\u0947 \u0915\u0947 \u0932\u093f\u090f \u0915\u0930\u0924\u0947 \u0939\u0948\u0902 , \u092f\u093e \u0906\u092a\u0915\u0947 \u0924\u0902\u0924\u094d\u0930 \u0915\u094b \u0915\u094d\u0937\u0924\u093f \u092a\u0939\u0941\u0901\u091a\u093e\u0924\u0947 \u0939\u0948\u0902.<\/p>
\u0915\u0941\u091b \u092d\u0947\u0926\u094d\u092f \u092a\u0943\u0937\u094d\u0920 \u0938\u093e\u092d\u093f\u092a\u094d\u0930\u093e\u092f \u0939\u093e\u0928\u093f\u0915\u093e\u0930\u0915 \u0938\u0949\u092b\u094d\u091f\u0935\u0947\u092f\u0930 \u0915\u094b \u0905\u0938\u094d\u0924\u0935\u094d\u092f\u0938\u094d\u0924 \u0915\u0930\u0924\u0947 \u0939\u0948\u0902 \u0932\u0947\u0915\u093f\u0928 \u092c\u0939\u0941\u0924 \u0938\u0947 \u092c\u093f\u0928\u093e \u092e\u093e\u0932\u093f\u0915 \u0915\u0940 \u091c\u093e\u0928\u0915\u093e\u0930\u0940 \u092f\u093e \u0905\u0928\u0941\u092e\u0924\u093f \u0915\u0947 \u092c\u093f\u0928\u093e \u0938\u092e\u091d\u094c\u0924\u093e \u0915\u0930 \u0932\u0947\u0924\u0947 \u0939\u0948\u0902.<\/p>","hr":"
Zlo\u0107udne stranice poku\u0161avaju instalirati programe koji kradu privatne informacije, koriste va\u0161e ra\u010dunalo za napade na druga ra\u010dunala ili o\u0161te\u0107uju va\u0161 sustav.<\/p>
Neke zlo\u0107udne stranice namjerno distribuiraju zlo\u0107udne programe, ali isto tako postoji mnogo stranica koje su izmijenjene bez znanja i dozvole njihovih vlasnika.<\/p>","hsb":"
Nadpadowe strony pospytuja programy instalowa\u0107, kotre\u017e priwatne informacije kradnu, wa\u0161 li\u010dak wu\u017eiwaja, zo bychu druhe nadpadnyli abo wa\u0161 system po\u0161kod\u017aili.<\/p>
N\u011bkotre nadpadowe strony rozd\u017a\u011bleja z wotpohladom \u0161k\u00f3dnu softwaru, ale wjele z nich wohro\u017euje so bjez w\u011bd\u017aenja abo dowolnos\u0107e jich wobsed\u017aerjow.<\/p>","hu":"
A t\u00e1mad\u00f3 weboldalak megpr\u00f3b\u00e1lnak olyan programokat telep\u00edteni, amelyek szem\u00e9lyes adatokat lopnak el, a sz\u00e1m\u00edt\u00f3g\u00e9pet m\u00e1sok megt\u00e1mad\u00e1s\u00e1ra haszn\u00e1lj\u00e1k, vagy k\u00e1ros\u00edtj\u00e1k a rendszert<\/p>
Egyes t\u00e1mad\u00f3 weboldalak sz\u00e1nd\u00e9kosan terjesztenek \u00e1rt\u00f3 szoftvereket, de sok olyan van, amelyet a tulajdonosa tudta vagy enged\u00e9lye n\u00e9lk\u00fcl haszn\u00e1lnak ilyen c\u00e9lra.<\/p>","hy-AM":"
\u0540\u0561\u0580\u0571\u0561\u056f\u057e\u0578\u0572 \u0567\u057b\u0565\u0580\u0568 \u0583\u0578\u0580\u0571\u0578\u0582\u0574 \u0565\u0576 \u057f\u0565\u0572\u0561\u0564\u0580\u0565\u056c \u056e\u0580\u0561\u0563\u0580\u0565\u0580, \u0578\u0580\u0578\u0576\u0584 \u0563\u0578\u0572\u0561\u0576\u0578\u0582\u0574 \u0565\u0576 \u0561\u0576\u0571\u0576\u0561\u056f\u0561\u0576 \u057f\u057e\u0575\u0561\u056c\u0576\u0565\u0580, \u0585\u0563\u057f\u0561\u0563\u0578\u0580\u056e\u0578\u0582\u0574 \u0565\u0576 \u0571\u0565\u0580 \u0570\u0561\u0574\u0561\u056f\u0561\u0580\u0563\u056b\u0579\u0568 \u0561\u0575\u056c \u0570\u0561\u0574\u0561\u056f\u0561\u0580\u0563\u056b\u0579\u0576\u0565\u0580\u056b \u057e\u0580\u0561 \u0570\u0561\u0580\u0571\u0561\u056f\u0574\u0561\u0576 \u0570\u0561\u0574\u0561\u0580:<\/p>
\u0548\u0580\u0578\u0577 \u0570\u0561\u0580\u0571\u0561\u056f\u057e\u0578\u0572 \u0567\u057b\u0565\u0580 \u0564\u056b\u057f\u0574\u0561\u0574\u0562 \u0565\u0576 \u057f\u0561\u0580\u0561\u056e\u0578\u0582\u0574 \u057e\u0576\u0561\u057d\u0561\u056f\u0561\u0580 \u056e\u0580\u0561\u0563\u0580\u0565\u0580, \u0562\u0561\u0575\u0581 \u0577\u0561\u057f\u0565\u0580\u0568 \u0564\u0561 \u0561\u0576\u0578\u0582\u0574 \u0565\u0576 \u0561\u057c\u0561\u0576\u0581 \u057d\u0565\u0583\u0561\u056f\u0561\u0576\u0561\u057f\u0565\u0580\u0565\u0580\u056b \u0563\u056b\u057f\u0578\u0582\u0569\u0575\u0561\u0576 \u056f\u0561\u0574 \u0570\u0561\u0574\u0561\u0571\u0561\u0575\u0576\u0578\u0582\u0569\u0575\u0561\u0576:<\/p>","ia":"
Le paginas de attacco essaya installar programmas que roba informationes private, usa vostre computator attaccar alteres, o damnifica vostre systema.<\/p>
Alcun paginas de attacco intentionalmente distribue software malefic, ma multe son compromittite sin cognoscimento o permission de lor maestros.<\/p>","id":"
Situs penyerang mencoba memasang program yang dapat mencuri informasi pribadi, menggunakan komputer untuk menyerang komputer lain, atau merusak sistem.<\/p>
Beberapa situs penyerang secara sengaja mendistribusikan perangkat lunak perusak dan banyak komputer telah terserang tanpa diketahui atau diizinkan pemiliknya.<\/p>","is":"
\u00c1r\u00e1sas\u00ed\u00f0ur reyna a\u00f0 setja inn forrit sem stela pers\u00f3nu uppl\u00fdsingum, nota t\u00e6ki\u00f0 \u00feitt til a\u00f0 r\u00e1\u00f0ast \u00e1 a\u00f0ra e\u00f0a skemma kerfi\u00f0 \u00feitt.<\/p>
Sumar \u00e1r\u00e1sas\u00ed\u00f0ur dreifa me\u00f0vita\u00f0 forritum sem ey\u00f0ileggja en oft eru \u00feetta vefsv\u00e6\u00f0i sem b\u00fai\u00f0 er a\u00f0 r\u00e1\u00f0ast \u00e1 og breyta \u00e1n vitundar e\u00f0a leyfis eigenda.<\/p>","it":"
Un sito web malevolo cerca di installare dei software in grado di sottrarre le informazioni personali degli utenti, sfruttare il computer per attaccare altre macchine o semplicemente danneggiare il sistema.<\/p>
Alcuni di questi siti distribuiscono intenzionalmente software dannoso, ma gran parte dei siti viene compromessa senza che il proprietario ne sia a conoscenza o ne sia responsabile.<\/p>","ja":"
\u653b\u6483\u30b5\u30a4\u30c8\u306f\u3042\u306a\u305f\u306e\u500b\u4eba\u60c5\u5831\u3092\u76d7\u3093\u3060\u308a\u3001\u30b3\u30f3\u30d4\u30e5\u30fc\u30bf\u30fc\u3092\u4e57\u3063\u53d6\u3063\u3066\u4ed6\u306e\u30b3\u30f3\u30d4\u30e5\u30fc\u30bf\u30fc\u3078\u306e\u653b\u6483\u306b\u5229\u7528\u3057\u305f\u308a\u3001\u3042\u306a\u305f\u306e\u30b7\u30b9\u30c6\u30e0\u3092\u7834\u58ca\u3059\u308b\u305f\u3081\u306e\u30d7\u30ed\u30b0\u30e9\u30e0\u3092\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3057\u3088\u3046\u3068\u3057\u307e\u3059\u3002<\/p>
\u4e00\u90e8\u306e\u653b\u6483\u30b5\u30a4\u30c8\u306f\u610f\u56f3\u7684\u306b\u6709\u5bb3\u306a\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u3092\u914d\u5e03\u3057\u3066\u3044\u307e\u3059\u304c\u3001\u591a\u304f\u306e\u5834\u5408\u306f\u904b\u55b6\u8005\u304c\u77e5\u3089\u305a\u306b\u307e\u305f\u306f\u8a31\u53ef\u306a\u304f\u6709\u5bb3\u306a\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u306e\u914d\u5e03\u306b\u4e0d\u6b63\u5229\u7528\u3055\u308c\u3066\u3044\u307e\u3059\u3002<\/p>","ja-JP-mac":"
\u653b\u6483\u30b5\u30a4\u30c8\u306f\u3042\u306a\u305f\u306e\u500b\u4eba\u60c5\u5831\u3092\u76d7\u3093\u3060\u308a\u3001\u30b3\u30f3\u30d4\u30e5\u30fc\u30bf\u30fc\u3092\u4e57\u3063\u53d6\u3063\u3066\u4ed6\u306e\u30b3\u30f3\u30d4\u30e5\u30fc\u30bf\u30fc\u3078\u306e\u653b\u6483\u306b\u5229\u7528\u3057\u305f\u308a\u3001\u3042\u306a\u305f\u306e\u30b7\u30b9\u30c6\u30e0\u3092\u7834\u58ca\u3059\u308b\u305f\u3081\u306e\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u3092\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3057\u3088\u3046\u3068\u3057\u307e\u3059\u3002<\/p>
\u4e00\u90e8\u306e\u653b\u6483\u30b5\u30a4\u30c8\u306f\u610f\u56f3\u7684\u306b\u6709\u5bb3\u306a\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u3092\u914d\u5e03\u3057\u3066\u3044\u307e\u3059\u304c\u3001\u591a\u304f\u306e\u5834\u5408\u306f\u904b\u55b6\u8005\u304c\u77e5\u3089\u305a\u306b\u307e\u305f\u306f\u8a31\u53ef\u306a\u304f\u6709\u5bb3\u306a\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u306e\u914d\u5e03\u306b\u4e0d\u6b63\u5229\u7528\u3055\u308c\u3066\u3044\u307e\u3059\u3002<\/p>","ka":"
\u10db\u10dd\u10d8\u10d4\u10e0\u10d8\u10e8\u10d4 \u10d2\u10d5\u10d4\u10e0\u10d3\u10d4\u10d1\u10d8 \u10ea\u10d3\u10d8\u10da\u10dd\u10d1\u10d4\u10dc \u10d3\u10d0\u10d0\u10e7\u10d4\u10dc\u10dd\u10dc \u10de\u10e0\u10dd\u10d2\u10e0\u10d0\u10db\u10d4\u10d1\u10d8, \u10e0\u10dd\u10db\u10da\u10d8\u10d7\u10d0\u10ea \u10db\u10dd\u10d8\u10de\u10d0\u10e0\u10d0\u10d5\u10d4\u10dc \u10de\u10d8\u10e0\u10d0\u10d3 \u10db\u10dd\u10dc\u10d0\u10ea\u10d4\u10db\u10d4\u10d1\u10e1, \u10d2\u10d0\u10db\u10dd\u10d8\u10e7\u10d4\u10dc\u10d4\u10d1\u10d4\u10dc \u10d7\u10e5\u10d5\u10d4\u10dc\u10e1 \u10d9\u10dd\u10db\u10de\u10d8\u10e3\u10e2\u10d4\u10e0\u10e1 \u10e1\u10ee\u10d5\u10d4\u10d1\u10d6\u10d4 \u10e8\u10d4\u10e1\u10d0\u10e2\u10d4\u10d5\u10d0\u10d3, \u10d0\u10dc \u10d3\u10d0\u10d0\u10d6\u10d8\u10d0\u10dc\u10d4\u10d1\u10d4\u10dc \u10d7\u10e5\u10d5\u10d4\u10dc\u10e1 \u10e1\u10d8\u10e1\u10e2\u10d4\u10db\u10d0\u10e1.<\/p>
\u10d6\u10dd\u10d2\u10d8\u10d4\u10e0\u10d7\u10d8 \u10db\u10dd\u10d8\u10d4\u10e0\u10d8\u10e8\u10d4 \u10d2\u10d5\u10d4\u10e0\u10d3\u10d8, \u10d2\u10d0\u10dc\u10d6\u10e0\u10d0\u10ee \u10d0\u10d5\u10e0\u10ea\u10d4\u10da\u10d4\u10d1\u10e1 \u10db\u10d0\u10d5\u10dc\u10d4 \u10de\u10e0\u10dd\u10d2\u10e0\u10d0\u10db\u10d4\u10d1\u10e1, \u10d7\u10e3\u10db\u10ea\u10d0 \u10e3\u10db\u10d4\u10e2\u10d4\u10e1\u10dd\u10d1\u10d0, \u10e8\u10d4\u10e1\u10d0\u10eb\u10da\u10dd\u10d0 \u10d2\u10d0\u10e2\u10d4\u10ee\u10d8\u10da\u10d8 \u10d8\u10e7\u10dd\u10e1 \u10d3\u10d0 \u10d0\u10db\u10d0\u10e1, \u10db\u10e4\u10da\u10dd\u10d1\u10d4\u10da\u10d8\u10e1 \u10dc\u10d4\u10d1\u10d0\u10e0\u10d7\u10d5\u10d8\u10e1 \u10d2\u10d0\u10e0\u10d4\u10e8\u10d4, \u10db\u10d8\u10e1\u10d8 \u10d2\u10d5\u10d4\u10e0\u10d3\u10d8\u10e1 \u10d0\u10d5\u10da\u10d8\u10d7 \u10e1\u10e9\u10d0\u10d3\u10d8\u10dd\u10d3\u10d4\u10e1.<\/p>","kab":"
Isebtar n u\u1e93dam tta\u025bra\u1e0den ad sbedden ahilen i yettakwren tal\u0263ut tusligt, i yesseqdacen aselkim-inek i u\u1e93dam \u0263ef iselkimen nni\u1e0den ne\u0263 ad sexe\u1e63ren anagraw-inek.<\/p>
Kra n isebtar n uz\u1e0dam zuzuren yir ise\u0263\u1e93anen, acu kan ddeqs deg-sen ur ssawa\u1e0den ara ad sexs\u1e5ben ma yella ur sen-tefki\u1e0d ara tasiregt.<\/p>","kk":"
\u0428\u0430\u0431\u0443\u044b\u043b\u0448\u044b \u043f\u0430\u0440\u0430\u049b\u0442\u0430\u0440 \u0436\u0435\u043a\u0435 \u0430\u049b\u043f\u0430\u0440\u0430\u0442\u0442\u044b \u04b1\u0440\u043b\u0430\u0439\u0442\u044b\u043d, \u043a\u043e\u043c\u043f\u044c\u044e\u0442\u0435\u0440\u0456\u04a3\u0456\u0437\u0434\u0456 \u0431\u0430\u0441\u049b\u0430 \u043a\u043e\u043c\u043f\u044c\u044e\u0442\u0435\u0440\u043b\u0435\u0440\u0433\u0435 \u0448\u0430\u0431\u0443\u044b\u043b \u0436\u0430\u0441\u0430\u0443\u0493\u0430 \u049b\u043e\u043b\u0434\u0430\u043d\u0430\u0442\u044b\u043d, \u043d\u0435 \u0436\u04af\u0439\u0435\u04a3\u0456\u0437\u0434\u0456 \u0437\u0430\u049b\u044b\u043c\u0434\u0430\u0439\u0442\u044b\u043d \u0431\u0430\u0493\u0434\u0430\u0440\u043b\u0430\u043c\u0430\u043b\u0430\u0440\u0434\u044b \u043e\u0440\u043d\u0430\u0442\u049b\u044b\u0441\u044b \u043a\u0435\u043b\u0435\u0434\u0456.<\/p>
\u041a\u0435\u0439\u0431\u0456\u0440 \u0448\u0430\u0431\u0443\u044b\u043b\u0448\u044b \u043f\u0430\u0440\u0430\u049b\u0442\u0430\u0440 \u0437\u0438\u044f\u043d\u0434\u044b \u0431\u0430\u0493\u0434\u0430\u0440\u043b\u0430\u043c\u0430\u043b\u0430\u0440\u0434\u044b \u04d9\u0434\u0435\u0439\u0456 \u0442\u0430\u0440\u0430\u0442\u0430\u0434\u044b, \u0431\u0456\u0440\u0430\u049b, \u043a\u0435\u0439\u0431\u0456\u0440 \u043f\u0430\u0440\u0430\u049b\u0442\u0430\u0440 \u04e9\u0437\u0434\u0435\u0440\u0456\u043d\u0456\u04a3 \u0438\u0435\u043b\u0435\u0440\u0456 \u0431\u0456\u043b\u043c\u0435\u0439\u0442\u0456\u043d\u0434\u0435\u0439 \u0436\u04d9\u043d\u0435 \u043e\u043b\u0430\u0440\u0434\u044b\u04a3 \u0440\u04b1\u049b\u0441\u0430\u0442\u044b \u0436\u043e\u049b \u0436\u0430\u0493\u0434\u0430\u0439\u0493\u0430 \u04d9\u0434\u0435\u0439\u0456 \u043a\u0435\u043b\u0442\u0456\u0440\u0456\u043b\u0433\u0435\u043d.<\/p>","km":"
\u1791\u17c6\u1796\u17d0\u179a\u200b\u179c\u17b6\u1799\u1794\u17d2\u179a\u17a0\u17b6\u179a \u1794\u17b6\u1793\u200b\u1796\u17d2\u1799\u17b6\u1799\u17b6\u1798\u200b\u178a\u17c6\u17a1\u17be\u1784\u200b\u1780\u1798\u17d2\u1798\u179c\u17b7\u1792\u17b8\u200b\u178a\u17c2\u179b\u200b\u17a2\u17b6\u1785\u200b\u179b\u17bd\u1785\u200b\u1799\u1780\u200b\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793\u200b\u1795\u17d2\u1791\u17b6\u179b\u17cb\u1781\u17d2\u179b\u17bd\u1793\u200b\u179a\u1794\u179f\u17cb\u200b\u17a2\u17d2\u1793\u1780 \u17ac\u200b\u1794\u17d2\u179a\u17be\u200b\u1780\u17bb\u17c6\u1796\u17d2\u1799\u17bc\u1791\u17d0\u179a\u200b\u179a\u1794\u179f\u17cb\u200b\u17a2\u17d2\u1793\u1780\u200b\u178a\u17be\u1798\u17d2\u1794\u17b8\u200b\u179c\u17b6\u1799\u1794\u17d2\u179a\u17a0\u17b6\u179a\u200b\u1780\u17bb\u17c6\u1796\u17d2\u1799\u17bc\u1791\u17d0\u179a\u200b\u17a2\u17d2\u1793\u1780\u200b\u178a\u1791\u17c3 \u17ac\u200b\u17a2\u17b6\u1785\u200b\u1794\u17c6\u1795\u17d2\u179b\u17b6\u1789\u200b\u1794\u17d2\u179a\u1796\u17d0\u1793\u17d2\u1792\u200b\u179a\u1794\u179f\u17cb\u200b\u17a2\u17d2\u1793\u1780\u00a0\u17d4<\/p>
\u1791\u17c6\u1796\u17d0\u179a\u200b\u179c\u17b6\u1799\u1794\u17d2\u179a\u17a0\u17b6\u179a\u200b\u1798\u17bd\u1799\u200b\u1785\u17c6\u1793\u17bd\u1793\u200b\u1798\u17b6\u1793\u200b\u1785\u17c1\u178f\u1793\u17b6\u200b\u1785\u17c2\u1780\u1785\u17b6\u1799\u200b\u1793\u17bc\u179c\u200b\u1780\u1798\u17d2\u1798\u179c\u17b7\u1792\u17b8\u200b\u178a\u17c2\u179b\u200b\u1782\u17c1\u200b\u17a0\u17b6\u1798\u1794\u17d2\u179a\u17b6\u1798 \u1794\u17c9\u17bb\u1793\u17d2\u178f\u17c2\u200b\u1791\u17c6\u1796\u17d0\u179a\u200b\u1787\u17b6\u200b\u1785\u17d2\u179a\u17be\u1793\u200b\u1791\u17c0\u178f\u200b\u1782\u17ba\u200b\u178f\u17d2\u179a\u17bc\u179c\u200b\u1794\u17b6\u1793\u200b\u1792\u17d2\u179c\u17be\u200b\u17a1\u17be\u1784\u200b\u178a\u17c4\u1799\u200b\u200b\u1798\u17b7\u1793\u1794\u17b6\u1793\u200b\u1799\u179b\u17cb\u200b\u178a\u17b9\u1784 \u17ac\u200b\u1798\u17b7\u1793\u200b\u1798\u17b6\u1793\u200b\u179f\u17b7\u1791\u17d2\u1792\u17b7\u200b\u1796\u17b8\u200b\u17a2\u17d2\u1793\u1780\u1782\u17d2\u179a\u1794\u17cb\u1782\u17d2\u179a\u1784 \u17ac\u200b\u1798\u17d2\u1785\u17b6\u179f\u17cb\u200b\u179a\u1794\u179f\u17cb\u200b\u179c\u17b6\u00a0\u17d4<\/p>","kn":"
\u0ca7\u0cbe\u0cb3\u0cbf\u0c95\u0cbe\u0cb0\u0c95 \u0caa\u0cc1\u0c9f\u0c97\u0cb3\u0cc1 \u0ca8\u0cbf\u0cae\u0ccd\u0cae \u0c96\u0cbe\u0cb8\u0c97\u0cbf \u0cae\u0cbe\u0cb9\u0cbf\u0ca4\u0cbf\u0caf\u0ca8\u0ccd\u0ca8\u0cc1 \u0c95\u0ca6\u0cbf\u0caf\u0cc1\u0cb5\u0c82\u0ca4\u0cb9, \u0c87\u0ca4\u0cb0\u0cb0\u0ca4\u0ccd\u0ca4 \u0ca7\u0cbe\u0cb3\u0cbf \u0cae\u0cbe\u0ca1\u0cc1\u0cb5 \u0cb8\u0cb2\u0cc1\u0cb5\u0cbe\u0c97\u0cbf \u0ca8\u0cbf\u0cae\u0ccd\u0cae \u0c97\u0ca3\u0c95\u0cb5\u0ca8\u0ccd\u0ca8\u0cc1 \u0cac\u0cb3\u0cb8\u0cac\u0cb9\u0cc1\u0ca6\u0cbe\u0ca6\u0c82\u0ca4\u0cb9, \u0c85\u0ca5\u0cb5 \u0ca8\u0cbf\u0cae\u0ccd\u0cae \u0c97\u0ca3\u0c95\u0cb5\u0ca8\u0ccd\u0ca8\u0cc1 \u0cb9\u0cbe\u0cb3\u0cc1\u0c97\u0cc6\u0ca1\u0cb5\u0cac\u0cb2\u0ccd\u0cb2\u0c82\u0ca4\u0cb9 \u0caa\u0ccd\u0cb0\u0cca\u0c97\u0ccd\u0cb0\u0cbe\u0c82\u0c97\u0cb3\u0ca8\u0ccd\u0ca8\u0cc1 \u0c85\u0ca8\u0cc1\u0cb8\u0ccd\u0ca5\u0cbe\u0caa\u0cbf\u0cb8\u0cb2\u0cc1 \u0caa\u0ccd\u0cb0\u0caf\u0ca4\u0ccd\u0ca8\u0cbf\u0cb8\u0cc1\u0ca4\u0ccd\u0ca4\u0cb5\u0cc6.<\/p>
\u0c95\u0cc6\u0cb2\u0cb5\u0cc1 \u0ca7\u0cbe\u0cb3\u0cbf\u0c95\u0cbe\u0cb0\u0c95 \u0caa\u0cc1\u0c9f\u0c97\u0cb3\u0cc1 \u0c89\u0ca6\u0ccd\u0ca7\u0cc7\u0cb6\u0caa\u0cc2\u0cb0\u0ccd\u0cb5\u0c95\u0cb5\u0cbe\u0c97\u0cbf \u0c85\u0caa\u0cbe\u0caf\u0c95\u0cbe\u0cb0\u0cbf \u0ca4\u0c82\u0ca4\u0ccd\u0cb0\u0cbe\u0c82\u0cb6\u0cb5\u0ca8\u0ccd\u0ca8\u0cc1 \u0cb5\u0cbf\u0ca4\u0cb0\u0cbf\u0cb8\u0cc1\u0ca4\u0ccd\u0ca4\u0cb5\u0cc6, \u0c86\u0ca6\u0cb0\u0cc6 \u0cb9\u0cc6\u0c9a\u0ccd\u0c9a\u0cbf\u0ca8\u0cb5\u0cc1 \u0c85\u0cb5\u0cc1\u0c97\u0cb3 \u0cae\u0cbe\u0cb2\u0cbf\u0c95\u0cb0\u0cbf\u0c97\u0cc6 \u0ca4\u0cbf\u0cb3\u0cbf\u0ca6\u0cbf\u0cb0\u0cc1\u0cb5\u0cc1\u0ca6\u0cbf\u0cb2\u0ccd\u0cb2 \u0c85\u0ca5\u0cb5 \u0c85\u0cb5\u0cb0 \u0c85\u0ca8\u0cc1\u0cae\u0ca4\u0cbf \u0caa\u0ca1\u0cc6\u0ca6\u0cbf\u0cb0\u0cc1\u0cb5\u0cc1\u0ca6\u0cbf\u0cb2\u0ccd\u0cb2.<\/p>","ko":"
\uacf5\uaca9 \uc0ac\uc774\ud2b8\uc5d0\uc11c \uac1c\uc778 \uc815\ubcf4\ub97c \ud0c8\ucde8\ud558\uac70\ub098, \ub2e4\ub978 \uacf3\uc744 \uacf5\uaca9\ud558\ub824\uace0 \ub2f9\uc2e0\uc758 \ucef4\ud4e8\ud130\ub97c \uc774\uc6a9\ud558\uac70\ub098 \ub610\ub294 \ub2f9\uc2e0\uc758 \uc2dc\uc2a4\ud15c\uc5d0 \ud53c\ud574\ub97c \uc8fc\ub824\uace0 \uc545\uc131 \ud504\ub85c\uadf8\ub7a8\uc744 \uc124\uce58\ud558\ub824\uace0 \ud569\ub2c8\ub2e4.<\/p>
\uc5b4\ub5a4 \uacf5\uaca9 \uc0ac\uc774\ud2b8\ub294 \uc758\ub3c4\uc801\uc73c\ub85c \uc545\uc131 \uc18c\ud504\ud2b8\uc6e8\uc5b4\ub97c \ubc30\ud3ec\ud558\uc9c0\ub9cc \uadf8\uac83\ub4e4\uc5d0 \ub300\ud55c \uc9c0\uc2dd\uc774\ub098 \uad8c\ud55c\uc774 \uc5c6\uc5b4 \ub9ce\uc740 \uc2dc\uc2a4\ud15c\ub4e4\uc774 \uc81c\ub300\ub85c \ub300\ucc98\ub97c \ud558\uc9c0 \ubabb\ud569\ub2c8\ub2e4.<\/p>","lij":"
E pagine de atacco preuvan a instal\u00e2 de aplica\u00e7ioin che ar\u00f6ban e informa\u00e7ioin priv\u00e6, adeuvian o teu computer pe atac\u00e2 i atri \u00f2 aroinan o teu computer<\/p>
Quarche pagina de atacco a peu mette in gio aplica\u00e7ioin peigoze ma tante no fon\u00e7ionan sensa a conoscensa \u00f2 o permisso di propietai.<\/p>","lo":"
\u0eab\u0e99\u0ec9\u0eb2\u0ec0\u0ea7\u0eb1\u0e9a\u0e97\u0eb5\u0ec8\u0ea1\u0eb5\u0ec4\u0ea7\u0ea5\u0eb1\u0eaa\u0e88\u0eb0\u0e9e\u0eb0\u0e8d\u0eb2\u0e8d\u0eb2\u0ea1\u0e95\u0eb4\u0e94\u0e95\u0eb1\u0ec9\u0e87\u0ec2\u0e9b\u0ebc\u0ec1\u0e81\u0ea3\u0ea1\u0e97\u0eb5\u0eb5\u0ec8\u0ec3\u0e8a\u0ec9\u0ec0\u0e9e\u0eb7\u0ec8\u0ead\u0eab\u0ea5\u0eb1\u0e81\u0ec0\u0ead\u0ebb\u0eb2\u0e82\u0ecd\u0ec9\u0ea1\u0eb9\u0e99\u0eaa\u0ec8\u0ea7\u0e99\u0e95\u0ebb\u0ea7\u0e82\u0ead\u0e87\u0e97\u0ec8\u0eb2\u0e99, \u0ec3\u0e8a\u0ec9\u0e84\u0ead\u0ea1\u0e9e\u0eb4\u0ea7\u0ec0\u0e95\u0eb5\u0e82\u0ead\u0e87\u0e97\u0ec8\u0eb2\u0e99\u0ec4\u0e9b\u0ec2\u0e88\u0ea1\u0e95\u0eb5\u0ec0\u0e84\u0eb7\u0ec8\u0ead\u0e87\u0ead\u0eb7\u0ec8\u0e99, \u0eab\u0ea5\u0eb7\u0e97\u0eb3\u0ea5\u0eb2\u0e8d\u0ea5\u0eb0\u0e9a\u0ebb\u0e9a\u0e82\u0ead\u0e87\u0e97\u0ec8\u0eb2\u0e99. <\/p>
\u0e9a\u0eb2\u0e87\u0eab\u0e99\u0ec9\u0eb2\u0ec0\u0ea7\u0eb1\u0e9a\u0e97\u0eb5\u0ec8\u0ea1\u0eb5\u0ec4\u0ea7\u0ea5\u0eb1\u0eaa\u0e88\u0eb0\u0ea1\u0eb5\u0e88\u0eb8\u0e94\u0e9b\u0eb0\u0eaa\u0ebb\u0e87\u0e81\u0eb0\u0e88\u0eb2\u0e8d\u0e8a\u0eb1\u0ead\u0e9a\u0ec1\u0ea7\u0e97\u0eb5\u0ec8\u0ec0\u0e9b\u0eb1\u0e99\u0ead\u0eb1\u0e99\u0e95\u0eb0\u0ea5\u0eb2\u0e8d, \u0ec1\u0e95\u0ea7\u0ec8\u0eb2\u0ea1\u0eb5\u0eab\u0ea5\u0eb2\u0e8d\u0e84\u0ebb\u0e99\u0e97\u0eb5\u0ec8\u0e96\u0eb7\u0e81\u0e9a\u0eb8\u0e81\u0ea5\u0eb8\u0e81\u0ec2\u0e94\u0e8d\u0e97\u0eb5\u0ec8\u0e9a\u0ecd\u0ec8\u0eae\u0eb9\u0ec9\u0e95\u0ebb\u0ea7 \u0eab\u0ea5\u0eb7 \u0e9a\u0ecd\u0ec8\u0ec4\u0e94\u0ec9\u0eae\u0eb1\u0e9a\u0ead\u0eb0\u0e99\u0eb8\u0e8d\u0eb2\u0e94\u0e88\u0eb2\u0e81\u0ec0\u0e88\u0ebb\u0ec9\u0eb2\u0e82\u0ead\u0e87\u0e84\u0ead\u0ea1.<\/p>","lt":"
Kenk\u0117ji\u0161kais tinklalapiais siekiama \u012fdiegti programas, vagian\u010dias asmeninius duomenis, naudojan\u010dias kompiuter\u012f kit\u0173 atakoms ir kenkian\u010dias pa\u010diai sistemai.<\/p>
Kai kuriuose tinklalapiuose tai daroma ty\u010dia, ta\u010diau da\u017eniausiai tai \u2013 nesankcionuoto \u012fsiki\u0161imo \u012f tinklalap\u012f be jo savinink\u0173 \u017einios pas\u0117km\u0117.<\/p>","ltg":"
Attack pages try to install programs that steal private information, use your computer to attack others, or damage your system.<\/p>
Some attack pages intentionally distribute harmful software, but many are compromised without the knowledge or permission of their owners.<\/p>","lv":"
B\u012bstam\u0101s lapas m\u0113\u0123ina instal\u0113t lietot\u0101ju datoros programmas, kas zog priv\u0101to inform\u0101ciju, izmanto j\u016bsu datoru uzbrukumos citiem vai cit\u0101di kait\u0113 jums.<\/p>
Da\u017eas lapas apzin\u0101ti izplata kaitniecisku programmat\u016bru, bet liel\u0101k\u0101 da\u013ca pa\u0161as ir k\u013cuvu\u0161as par kaitnieku upuriem.<\/p>","meh":"
Daa p\u00e1gina kuvi sa\u00b4a xeen kuvi chu\u00b4un daja iin ka\u0331a\u0331 s\u00e1\u00b4a kui\u00b4na informaci\u00f3n privada, ni\u00b4i-da ka\u0331a\u0331 tee n\u0268nuu saa sa\u00b4a xeen a xiin xitiv\u0268-da ka\u0331a\u0331 -nu.<\/p>
Iyo daa a sia\u00b4a la\u0331a\u0331 sa\u00b4a xeen jee daa inkaka nsa\u00b4a xeen-dama jee ntu jini niv\u0268 kumi nuu ya\u00b4a<\/p>","mr":"
\u0906\u0915\u094d\u0930\u092e\u0923 \u092a\u093e\u0928\u0947 \u0906\u092a\u0932\u0940 \u0916\u093e\u091c\u0917\u0940 \u092e\u093e\u0939\u093f\u0924\u0940 \u091a\u094b\u0930\u0923\u093e\u0930\u0947 \u092a\u094d\u0930\u094b\u0917\u094d\u0930\u093e\u092e \u092a\u094d\u0930\u0924\u093f\u0937\u094d\u0920\u093e\u092a\u093f\u0924 \u0915\u0930\u0923\u094d\u092f\u093e\u091a\u093e, \u0906\u092a\u0932\u0947 \u0938\u0902\u0917\u0923\u0915 \u0926\u0941\u0938\u0931\u094d\u092f\u093e\u0935\u0930 \u0906\u0915\u094d\u0930\u092e\u0923 \u0915\u0930\u0923\u094d\u092f\u093e\u091a\u093e, \u0915\u093f\u0902\u0935\u093e \u0906\u092a\u0932\u094d\u092f\u093e \u092a\u094d\u0930\u0923\u093e\u0932\u0940\u0932\u093e \u0939\u093e\u0928\u0940 \u0915\u0930\u0923\u094d\u092f\u093e\u091a\u093e \u092a\u094d\u0930\u092f\u0924\u094d\u0928 \u0915\u0930\u0924\u093e\u0924.<\/p>
\u0915\u093e\u0939\u0940 \u0906\u0915\u094d\u0930\u092e\u0923 \u092a\u093e\u0928\u0947 \u092e\u0941\u0926\u094d\u0926\u093e\u092e \u0939\u093e\u0928\u093f\u0915\u093e\u0930\u0915 \u0938\u0949\u092b\u094d\u091f\u0935\u0947\u0905\u0930 \u0935\u093f\u0924\u0930\u0940\u0924 \u0915\u0930\u0924\u093e\u0924, \u092a\u0923 \u0924\u094d\u092f\u093e\u0902\u0924\u0940\u0932 \u092c\u0930\u0947\u091a \u0924\u0930 \u0924\u094d\u092f\u093e\u0902\u091a\u094d\u092f\u093e \u092e\u093e\u0932\u0915\u093e\u0902\u091a\u094d\u092f\u093e \u092a\u0930\u0935\u093e\u0928\u0917\u0940\u0936\u093f\u0935\u093e\u092f \u0924\u0921\u091c\u094b\u0921 \u0915\u0947\u0932\u0940 \u091c\u093e\u0924\u0947.<\/p>","ms":"
Halaman penyerang akan cuba memasang atur cara yang mencuri maklumat peribadi, menggunakan komputer anda untuk menyerang pihak lain, atau merosakkan sistem anda.<\/p>
Sesetengah halaman penyerang dengan sengaja merebakkan perisian berbahaya, tapi kebanyakkannya menceroboh tanpa pengetahuan atau keizinan pemilik halaman.<\/p>","my":"
\u1010\u102d\u102f\u1000\u103a\u1001\u102d\u102f\u1000\u103a\u101e\u1031\u102c\u101d\u1010\u103a\u1005\u102c\u1019\u103b\u1000\u103a\u1014\u103e\u102c\u1019\u103b\u102c\u1038\u101e\u100a\u103a\u1000\u103d\u1014\u103a\u1015\u103b\u1030\u1010\u102c\u1021\u1010\u103d\u1004\u103a\u1038\u1021\u1001\u103b\u102d\u102f\u1037\u1015\u101b\u102d\u102f\u1002\u101b\u1019\u103a\u1019\u103b\u102c\u1038\u1011\u100a\u1037\u103a\u101e\u103d\u1004\u103a\u1038\u1015\u103c\u102e\u1038\u101e\u1004\u1037\u103a\u1021\u102c\u1038\u1021\u1001\u103c\u102c\u1038\u1010\u1005\u103a\u1014\u1031\u101b\u102c\u1019\u103e\u1010\u102d\u102f\u1000\u103a\u1001\u102d\u102f\u1000\u103a\u101b\u1014\u103a\u1000\u103c\u102d\u102f\u1038\u1015\u1019\u103a\u1038\u1014\u1031\u101e\u100a\u103a<\/p>
\u1021\u1001\u103b\u102d\u102f\u1037\u1010\u102d\u102f\u1000\u103a\u1001\u102d\u102f\u1000\u103a\u101d\u1010\u103a\u1005\u102c\u1019\u103b\u1000\u103a\u1014\u103e\u102c\u1019\u103b\u102c\u1038\u101e\u100a\u103a\u1014\u102d\u102f\u1004\u103a\u1004\u1036\u1010\u1000\u102c \u1021\u1006\u1004\u1037\u103a\u1021\u1014\u1039\u1010\u101b\u102c\u101a\u103a\u101b\u103e\u102d\u101e\u1031\u102c\u1006\u1031\u102c\u1037\u101d\u1032\u1019\u103b\u102c\u1038\u1021\u102c\u1038\u1016\u103c\u1014\u103a\u1001\u103b\u102e\u101c\u103b\u103e\u1000\u103a\u101b\u103e\u102d\u101e\u100a\u103a\u104b<\/p>","nb-NO":"
Angrepsnettsted fors\u00f8ker \u00e5 installere programmer som stjeler privat informasjon, bruker datamaskinen din for \u00e5 angripe andre eller skade systemet ditt.<\/p>
Noen angrepsnettsted sprer med hensikt programmer som er skadelige, og mange kan f\u00e5 programmene installert uten at de vet om det, eller gir tillatelse til det.<\/p>","ne-NP":"
\u0906\u0915\u094d\u0930\u092e\u0923 \u092a\u0943\u0937\u094d\u0920\u0932\u0947 \u0924\u094d\u092f\u0938\u094d\u0924\u094b \u0915\u093e\u0930\u094d\u092f\u0915\u094d\u0930\u092e \u0938\u094d\u0925\u093e\u092a\u0928\u093e \u0917\u0930\u094d\u0928\u0947 \u092a\u094d\u0930\u092f\u093e\u0938 \u0917\u0930\u094d\u091b \u091c\u0941\u0928 \u0924\u092a\u093e\u0908\u0901\u0915\u094b\u0915\u094b \u0917\u094b\u092a\u094d\u092f \u0938\u0942\u091a\u0928\u093e \u091a\u094b\u0930\u094d\u0928, \u0924\u092a\u093e\u0908\u0915\u094b \u0938\u0941\u0938\u093e\u0902\u0916\u094d\u092f \u092f\u0928\u094d\u0924\u094d\u0930 \u0905\u0930\u0941\u0932\u093e\u0908 \u0906\u0915\u094d\u0930\u092e\u0923 \u0917\u0930\u094d\u0928 \u0935\u093e \u0924\u092a\u093e\u0908\u0901\u0915\u094b \u0909\u092a\u0915\u0930\u0923 \u092c\u093f\u0917\u093e\u0930\u094d\u0928 \u092a\u094d\u0930\u092f\u094b\u0917 \u0939\u0941\u0928 \u0938\u0915\u094d\u091b\u0964<\/p>
\u0915\u0947\u0939\u093f \u0906\u0915\u094d\u0930\u092e\u0923 \u092a\u0943\u0937\u094d\u0920\u0932\u0947 \u091c\u093e\u0928\u0940 \u092c\u0941\u091d\u0940 \u0939\u093e\u0928\u093f\u0915\u093e\u0930\u0915 \u0938\u092b\u094d\u091f\u0935\u0947\u092f\u0930 \u0935\u093f\u0924\u0930\u0923 \u0917\u0930\u094d\u091b\u0928 \u0924\u0930 \u0927\u0947\u0930\u0948\u0932\u0947 \u092d\u0928\u0947 \u092e\u093e\u0932\u093f\u0915\u0915\u094b \u091c\u094d\u091e\u093e\u0928 \u092c\u093f\u0928\u093e \u0924\u0925\u093e \u0905\u0928\u0941\u092e\u0924\u093f \u092c\u093f\u0928\u093e\u0928\u0948 \u0939\u093e\u0928\u093f\u0915\u093e\u0930\u0915 \u0938\u092b\u094d\u091f\u0935\u0947\u092f\u0930 \u0935\u093f\u0924\u0930\u0923 \u0917\u0930\u094d\u091b\u0928\u0964<\/p>","nl":"
Aanvalpagina\u2019s proberen programma\u2019s te installeren die priv\u00e9gegevens stelen, uw computer gebruiken om anderen aan te vallen, of uw systeem beschadigen.<\/p>
Sommige aanvalpagina\u2019s verspreiden bewust schadelijke software, maar vele zijn gecompromitteerd zonder medeweten of toestemming van hun eigenaars.<\/p>","nn-NO":"
\u00c5taksnettstadar freistar \u00e5 installera program som stel privat informasjon, brukar datamaskina di for \u00e5 angripa andre eller skade systemet ditt.<\/p>
Nokre \u00e5taksnettstader spreier med vilje program som er skadelege, og mange kan f\u00e5 programma installerte utan at dei veit om det, eller gjev l\u00f8yve til det.<\/p>","oc":"
Los sites d\u2019atac ensajan d\u2019installar de programas que vos raubar d\u2019entresenhas personalas, utilizan v\u00f2stre ordenador per n\u2019atacar d\u2019autres o damatjan v\u00f2stre sist\u00e8ma.<\/p>
D\u2019unes sites d\u2019atac distribuisson amb intencion de programas dangieroses mas f\u00f2r\u00e7a son implicats sens o que sos proprietaris lo s\u00e0pian o l\u2019ajan perm\u00e9s.<\/p>","pa-IN":"
\u0a39\u0a2e\u0a32\u0a3e\u0a35\u0a30 \u0a38\u0a2b\u0a3c\u0a3e \u0a2a\u0a4d\u0a30\u0a4b\u0a17\u0a30\u0a3e\u0a2e \u0a07\u0a70\u0a38\u0a1f\u0a3e\u0a32 \u0a15\u0a30\u0a28 \u0a26\u0a40 \u0a15\u0a4b\u0a36\u0a3f\u0a36 \u0a15\u0a30\u0a26\u0a3e \u0a39\u0a48, \u0a1c\u0a4b \u0a15\u0a3f \u0a2a\u0a4d\u0a30\u0a3e\u0a08\u0a35\u0a47\u0a1f \u0a1c\u0a3e\u0a23\u0a15\u0a3e\u0a30\u0a40 \u0a1a\u0a4b\u0a30\u0a40 \u0a15\u0a30 \u0a38\u0a15\u0a26\u0a47 \u0a39\u0a28, \u0a24\u0a41\u0a39\u0a3e\u0a21\u0a47 \u0a15\u0a70\u0a2a\u0a3f\u0a0a\u0a1f\u0a30 \u0a28\u0a42\u0a70 \u0a39\u0a4b\u0a30\u0a3e\u0a02 \u0a09\u0a71\u0a24\u0a47 \u0a39\u0a2e\u0a32\u0a3e \u0a15\u0a30\u0a28 \u0a32\u0a08 \u0a35\u0a30\u0a24 \u0a38\u0a15\u0a26\u0a47 \u0a39\u0a48 \u0a1c\u0a3e\u0a02 \u0a24\u0a41\u0a39\u0a3e\u0a21\u0a47 \u0a15\u0a70\u0a2a\u0a3f\u0a0a\u0a1f\u0a30 \u0a28\u0a42\u0a70 \u0a28\u0a41\u0a15\u0a38\u0a3e\u0a28 \u0a2a\u0a39\u0a41\u0a70\u0a1a\u0a3e \u0a38\u0a15\u0a26\u0a47 \u0a39\u0a28<\/p>
\u0a15\u0a41\u0a1d \u0a39\u0a2e\u0a32\u0a3e\u0a35\u0a30 \u0a38\u0a2b\u0a3c\u0a47 \u0a1c\u0a3e\u0a23-\u0a2c\u0a41\u0a71\u0a1d \u0a15\u0a47 \u0a16\u0a3c\u0a24\u0a30\u0a28\u0a3e\u0a15 \u0a38\u0a3e\u0a2b\u0a1f\u0a35\u0a47\u0a05\u0a30 \u0a35\u0a70\u0a21\u0a26\u0a47 \u0a39\u0a28, \u0a1c\u0a26\u0a4b\u0a02 \u0a15\u0a08\u0a06\u0a02 \u0a28\u0a42\u0a70 \u0a09\u0a39\u0a28\u0a3e\u0a02 \u0a26\u0a47 \u0a2e\u0a3e\u0a32\u0a15\u0a3e\u0a02 \u0a26\u0a40 \u0a1c\u0a3e\u0a23\u0a15\u0a3e\u0a30\u0a40 \u0a1c\u0a3e\u0a02 \u0a2a\u0a41\u0a71\u0a1b\u0a47 \u0a2c\u0a3f\u0a28\u0a3e\u0a02 \u0a35\u0a30\u0a24\u0a3f\u0a06 \u0a1c\u0a3e\u0a02\u0a26\u0a3e \u0a39\u0a48<\/p>","pl":"
Tego rodzaju strony mog\u0105 pr\u00f3bowa\u0107 instalowa\u0107 oprogramowanie wykradaj\u0105ce poufne dane, u\u017cywaj\u0105ce komputera do po\u015bredniczenia w\u00a0atakach lub uszkadzaj\u0105ce system.<\/p>
Niekt\u00f3re szkodliwe strony celowo rozpowszechniaj\u0105 niebezpieczne oprogramowanie, ale wi\u0119kszo\u015b\u0107 z\u00a0nich dzia\u0142a na serwerach, na kt\u00f3re nast\u0105pi\u0142o w\u0142amanie.<\/p>","pt-BR":"
As p\u00e1ginas de ataque tentam instalar aplicativos que roubam informa\u00e7\u00f5es pessoais, usam o seu computador para atacar outros ou danificar o seu sistema.<\/p>
Alguns desses sites distribuem intencionalmente software malicioso, mas muitos est\u00e3o comprometidos sem o conhecimento ou permiss\u00e3o de seus respons\u00e1veis.<\/p>","pt-PT":"
As p\u00e1ginas de ataque tentam instalar programas que furtam a sua informa\u00e7\u00e3o privada, utilizam o seu computador para atacar outros, ou danificam o seu sistema.<\/p>
Algumas p\u00e1ginas de ataque distribuem intencionalmente software prejudicial, mas muitas s\u00e3o comprometidas sem o conhecimento ou permiss\u00e3o dos seus propriet\u00e1rios.<\/p>","rm":"
Websites attatgantas emprovan d'installar programs che engolan infurmaziuns privatas, dovran tes computer per attatgar auters u donnegian tes sistem.<\/p>
Tschertas paginas attatgantas derasan sapientivamain software donnegiusa, ma bleras \u00e8n pertutgadas senza che l'administratur saja perencletg u infurm\u00e0.<\/p>","ro":"
Paginile de atac \u00eencearc\u0103 s\u0103 instaleze programe care fur\u0103 informa\u021bii private, \u00ee\u021bi folosesc calculatorul ca s\u0103 atace alte calculatoare sau ca s\u0103 \u00ee\u021bi avarieze calculatorul.<\/p>
Unele pagini de atac distribuie cu bun\u0103 \u0219tiin\u021b\u0103 programe r\u0103u inten\u021bionate, dar multe dintre ele sunt compromise f\u0103r\u0103 \u0219tirea sau permisiunea proprietarilor lor.<\/p>","ru":"
\u0412\u0435\u0431-\u0441\u0442\u0440\u0430\u043d\u0438\u0446\u044b, \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0435 \u043a\u043e\u043c\u043f\u044c\u044e\u0442\u0435\u0440\u044b, \u043f\u044b\u0442\u0430\u044e\u0442\u0441\u044f \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0435, \u043a\u043e\u0442\u043e\u0440\u043e\u0435 \u043f\u043e\u0445\u0438\u0449\u0430\u0435\u0442 \u043f\u0435\u0440\u0441\u043e\u043d\u0430\u043b\u044c\u043d\u0443\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e, \u0432\u0440\u0435\u0434\u0438\u0442 \u0432\u0430\u0448\u0435\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u0438\u043b\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u0432\u0430\u0448 \u043a\u043e\u043c\u043f\u044c\u044e\u0442\u0435\u0440 \u0434\u043b\u044f \u0430\u0442\u0430\u043a \u043d\u0430 \u0434\u0440\u0443\u0433\u0438\u0435 \u043a\u043e\u043c\u043f\u044c\u044e\u0442\u0435\u0440\u044b.<\/p>
\u041d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0441\u0442\u0440\u0430\u043d\u0438\u0446\u044b \u043d\u0430\u043c\u0435\u0440\u0435\u043d\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u044b \u0434\u043b\u044f \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, \u043e\u0434\u043d\u0430\u043a\u043e \u043c\u043d\u043e\u0433\u0438\u0435 \u0441\u0442\u0440\u0430\u043d\u0438\u0446\u044b \u0431\u044b\u043b\u0438 \u0432\u0437\u043b\u043e\u043c\u0430\u043d\u044b \u0438 \u0434\u0435\u043b\u0430\u044e\u0442 \u044d\u0442\u043e \u0431\u0435\u0437 \u0432\u0435\u0434\u043e\u043c\u0430 \u0438\u043b\u0438 \u0440\u0430\u0437\u0440\u0435\u0448\u0435\u043d\u0438\u044f \u0441\u0432\u043e\u0438\u0445 \u0432\u043b\u0430\u0434\u0435\u043b\u044c\u0446\u0435\u0432.<\/p>","si":"
Attack pages try to install programs that steal private information, use your computer to attack others, or damage your system.<\/p>
Some attack pages intentionally distribute harmful software, but many are compromised without the knowledge or permission of their owners.<\/p>","sk":"
\u0160kodliv\u00e9 str\u00e1nky sa pok\u00fa\u0161aj\u00fa nain\u0161talova\u0165 programy, ktor\u00e9 kradn\u00fa s\u00fakromn\u00e9 \u00fadaje, pou\u017e\u00edvaj\u00fa po\u010d\u00edta\u010d na \u00fatoky na in\u00e9 po\u010d\u00edta\u010de alebo po\u0161kodzuj\u00fa syst\u00e9m.<\/p>
Niektor\u00e9 \u0161kodliv\u00e9 str\u00e1nky roz\u0161iruj\u00fa nebezpe\u010dn\u00fd softv\u00e9r \u00famyselne, ale mnoho z nich bolo napadnut\u00fdch a roz\u0161iruje tento softv\u00e9r bez vedomosti ich majite\u013ea.<\/p>","sl":"
Napadalne strani posku\u0161ajo namestiti programe za krajo osebnih podatkov, uporabijo va\u0161 ra\u010dunalnik za napad na druge ali po\u0161kodujejo va\u0161 sistem.<\/p>
Nekatere napadalne strani namenoma raz\u0161irjajo \u0161kodljivo programsko opremo, mnoge med njimi pa so omade\u017eevane brez vednosti njihovih lastnikov.<\/p>","son":"
darga mo\u0272ey ga wiri ka porogaramey sinji ka\u014b ga sutura alhabar zay, i ga war ordinateroo ka boro waaney ordineratey too\u0272e, wala ka war dabari\u0272a\u014boo hasara.<\/p>
Darga mo\u0272ey jerey ga tee hawandi ka goyjinay laalaya\u014b \u017eemna, amma iboobo ga hasaraw nda koyey mana bay wala i ma yadda.<\/p>","sq":"
Faqet e sulmeve p\u00ebrpiqen t\u00eb instalojn\u00eb programe q\u00eb vjedhin t\u00eb dh\u00ebna vetjake, q\u00eb p\u00ebrdorin kompjuterin tuaj p\u00ebr t\u00eb sulmuar t\u00eb tjer\u00ebt, ose q\u00eb d\u00ebmtojn\u00eb sistemin tuaj.<\/p>
Disa faqe sulmesh shp\u00ebrndajn\u00eb q\u00ebllimisht "software" t\u00eb d\u00ebmsh\u00ebm, por mjaft prej tyre jan\u00eb komprometuar pa dijenin\u00eb ose lejen e t\u00eb zot\u00ebve.<\/p>","sr":"
\u0417\u043b\u043e\u043d\u0430\u043c\u0435\u0440\u043d\u0435 \u0441\u0442\u0440\u0430\u043d\u0438\u0446\u0435 \u043e\u0431\u0438\u0447\u043d\u043e \u0438\u043d\u0441\u0442\u0430\u043b\u0438\u0440\u0430\u0458\u0443 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u0435 \u043a\u043e\u0458\u0438 \u043a\u0440\u0430\u0434\u0443 \u043f\u0440\u0438\u0432\u0430\u0442\u043d\u0435 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0458\u0435, \u043a\u043e\u0440\u0438\u0441\u0442\u0435 \u0432\u0430\u0448 \u0440\u0430\u0447\u0443\u043d\u0430\u0440 \u0434\u0430 \u043d\u0430\u043f\u0430\u0434\u043d\u0443 \u0434\u0440\u0443\u0433\u0435 \u0438\u043b\u0438 \u043e\u0448\u0442\u0435\u045b\u0443\u0458\u0443 \u0441\u0438\u0441\u0442\u0435\u043c.<\/p>
\u041d\u0435\u043a\u0438 \u043d\u0430\u043f\u0430\u0434\u0438 \u043d\u0430\u043c\u0435\u0440\u043d\u043e \u0448\u0438\u0440\u0435 \u0448\u0442\u0435\u0442\u0430\u043d \u0441\u043e\u0444\u0442\u0432\u0435\u0440, \u0430\u043b\u0438 \u043c\u043d\u043e\u0433\u0438 \u0441\u0443 \u0443\u0433\u0440\u043e\u0436\u0435\u043d\u0438 \u0431\u0435\u0437 \u0437\u043d\u0430\u045a\u0430 \u0438\u043b\u0438 \u0434\u043e\u0437\u0432\u043e\u043b\u0435 \u045a\u0438\u0445\u043e\u0432\u0438\u0445 \u0432\u043b\u0430\u0441\u043d\u0438\u043a\u0430.<\/p>","sv-SE":"
Angripande webbsidor f\u00f6rs\u00f6ker installera program f\u00f6r att stj\u00e4la privata uppgifter, anv\u00e4nda din dator f\u00f6r att angripa andras, eller f\u00f6r att skada ditt system.<\/p>
Vissa angripande webbsidor sprider medvetet skadlig programvara, men m\u00e5nga \u00e4r ocks\u00e5 komprometterade utan \u00e4garens k\u00e4nnedom eller till\u00e5telse.<\/p>","ta":"
\u0ba4\u0bbe\u0b95\u0bcd\u0b95\u0baa\u0bcd\u0baa\u0b9f\u0bcd\u0b9f \u0ba4\u0bb3\u0b99\u0bcd\u0b95\u0bb3\u0bcd \u0ba8\u0bbf\u0bb0\u0bb2\u0bcd\u0b95\u0bb3\u0bc8 \u0ba8\u0bbf\u0bb1\u0bc1\u0bb5\u0bbf\u0ba4\u0bcd \u0ba4\u0ba9\u0bbf\u0baa\u0bcd\u0baa\u0b9f\u0bcd\u0b9f \u0ba4\u0b95\u0bb5\u0bb2\u0bcd\u0b95\u0bb3\u0bc8\u0ba4\u0bcd \u0ba4\u0bbf\u0bb0\u0bc1\u0b9f\u0bc1\u0bae\u0bcd, \u0b89\u0b99\u0bcd\u0b95\u0bb3\u0bcd \u0b95\u0ba3\u0bbf\u0ba9\u0bbf\u0baf\u0bc8\u0baa\u0bcd \u0baa\u0baf\u0ba9\u0bcd\u0baa\u0b9f\u0bc1\u0ba4\u0bcd\u0ba4\u0bbf \u0bae\u0bb1\u0bcd\u0bb1\u0bb5\u0bb0\u0bcd\u0b95\u0bb3\u0bc8\u0ba4\u0bcd \u0ba4\u0bbe\u0b95\u0bcd\u0b95\u0bc1\u0bae\u0bcd \u0b85\u0bb2\u0bcd\u0bb2\u0ba4\u0bc1 \u0b89\u0b99\u0bcd\u0b95\u0bb3\u0bcd \u0b95\u0ba3\u0bbf\u0ba9\u0bbf\u0baf\u0bc8\u0b9a\u0bcd \u0b9a\u0bc7\u0ba4\u0baa\u0bcd\u0baa\u0b9f\u0bc1\u0ba4\u0bcd\u0ba4\u0bc1\u0bae\u0bcd.<\/p>
\u0b9a\u0bbf\u0bb2 \u0ba4\u0bbe\u0b95\u0bcd\u0b95\u0bc1\u0ba4\u0bb2\u0bcd \u0bb5\u0bc7\u0ba3\u0bcd\u0b9f\u0bc1\u0bae\u0bc6\u0ba9\u0bcd\u0bb1\u0bc7 \u0baa\u0bbe\u0ba4\u0bbf\u0baa\u0bcd\u0baa\u0b9f\u0bc8\u0baf \u0b9a\u0bc6\u0baf\u0bcd\u0baf\u0bc1\u0bae\u0bcd \u0bae\u0bc6\u0ba9\u0bcd\u0baa\u0bca\u0bb0\u0bc1\u0bb3\u0bc8 \u0bb5\u0bbf\u0ba8\u0bbf\u0baf\u0bcb\u0b95\u0bbf\u0b95\u0bcd\u0b95\u0bc1\u0bae\u0bcd, \u0b86\u0ba9\u0bbe\u0bb2\u0bcd \u0b9a\u0bbf\u0bb2 \u0b89\u0bb0\u0bbf\u0bae\u0bc8\u0baf\u0bbe\u0bb3\u0bb0\u0bbf\u0ba9\u0bcd \u0b85\u0ba9\u0bc1\u0bae\u0ba4\u0bbf \u0b87\u0bb2\u0bcd\u0bb2\u0bbe\u0bae\u0bb2\u0bcd \u0b9a\u0bc6\u0baf\u0bb2\u0bcd\u0baa\u0b9f\u0bc1\u0bae\u0bcd.<\/p>","te":"
\u0c26\u0c3e\u0c21\u0c3f \u0c38\u0c48\u0c1f\u0c41\u0c32\u0c41 \u0c2e\u0c40\u0c35\u0c4d\u0c2f\u0c15\u0c4d\u0c24\u0c3f\u0c17\u0c24 \u0c38\u0c2e\u0c3e\u0c1a\u0c3e\u0c30\u0c3e\u0c28\u0c4d\u0c28\u0c3f \u0c26\u0c4a\u0c02\u0c17\u0c3f\u0c32\u0c3f\u0c02\u0c1a\u0c41 \u0c2a\u0c4d\u0c30\u0c4b\u0c17\u0c4d\u0c30\u0c3e\u0c2e\u0c4d\u200c\u0c32\u0c28\u0c41 \u0c38\u0c02\u0c38\u0c4d\u0c25\u0c3e\u0c2a\u0c3f\u0c02\u0c1a\u0c41\u0c1f\u0c15\u0c41 \u0c2a\u0c4d\u0c30\u0c2f\u0c24\u0c4d\u0c28\u0c3f\u0c38\u0c4d\u0c24\u0c3e\u0c2f\u0c3f, \u0c2e\u0c40\u0c15\u0c02\u0c2a\u0c4d\u0c2f\u0c42\u0c1f\u0c30\u0c4d \u0c07\u0c24\u0c30\u0c41\u0c32\u0c28\u0c41 \u0c26\u0c3e\u0c21\u0c3f\u0c1a\u0c47\u0c2f\u0c41\u0c1f\u0c15\u0c41 \u0c35\u0c41\u0c2a\u0c2f\u0c4b\u0c17\u0c3f\u0c38\u0c4d\u0c24\u0c3e\u0c2f\u0c3f, \u0c32\u0c47\u0c26\u0c3e \u0c2e\u0c40\u0c38\u0c3f\u0c38\u0c4d\u0c1f\u0c2e\u0c4d\u200c\u0c28\u0c41 \u0c2a\u0c3e\u0c21\u0c41\u0c1a\u0c47\u0c38\u0c4d\u0c24\u0c3e\u0c2f\u0c3f.<\/p>
\u0c15\u0c4a\u0c28\u0c4d\u0c28\u0c3f \u0c26\u0c3e\u0c21\u0c3f\u0c38\u0c48\u0c1f\u0c41\u0c32\u0c41 \u0c15\u0c3e\u0c35\u0c3e\u0c32\u0c28\u0c3f \u0c39\u0c3e\u0c28\u0c3f\u0c15\u0c3e\u0c30\u0c15 \u0c38\u0c3e\u0c2b\u0c4d\u0c1f\u0c4d\u200c\u0c35\u0c47\u0c30\u0c41\u0c28\u0c41 \u0c2a\u0c02\u0c2a\u0c3f\u0c23\u0c3f\u0c1a\u0c47\u0c38\u0c4d\u0c24\u0c3e\u0c2f\u0c3f,\u0c15\u0c3e\u0c28\u0c3f \u0c1a\u0c3e\u0c32\u0c3e\u0c35\u0c30\u0c15\u0c41 \u0c35\u0c3e\u0c1f\u0c3f\u0c2f\u0c1c\u0c2e\u0c3e\u0c28\u0c41\u0c32 \u0c05\u0c28\u0c41\u0c2e\u0c24\u0c3f\u0c17\u0c3e\u0c28\u0c3f \u0c32\u0c47\u0c26\u0c3e \u0c38\u0c02\u0c2c\u0c02\u0c27\u0c02\u0c17\u0c3e\u0c28\u0c3f \u0c32\u0c47\u0c15\u0c41\u0c02\u0c21\u0c3e\u0c28\u0c47 \u0c30\u0c3e\u0c1c\u0c40\u0c15\u0c3f \u0c35\u0c38\u0c4d\u0c24\u0c3e\u0c2f\u0c3f.<\/p>","th":"
\u0e2b\u0e19\u0e49\u0e32\u0e23\u0e38\u0e01\u0e23\u0e32\u0e19\u0e08\u0e30\u0e1e\u0e22\u0e32\u0e22\u0e32\u0e21\u0e15\u0e34\u0e14\u0e15\u0e31\u0e49\u0e07\u0e42\u0e1b\u0e23\u0e41\u0e01\u0e23\u0e21\u0e17\u0e35\u0e48\u0e02\u0e42\u0e21\u0e22\u0e02\u0e49\u0e2d\u0e21\u0e39\u0e25\u0e2a\u0e48\u0e27\u0e19\u0e15\u0e31\u0e27 \u0e43\u0e0a\u0e49\u0e04\u0e2d\u0e21\u0e1e\u0e34\u0e27\u0e40\u0e15\u0e2d\u0e23\u0e4c\u0e02\u0e2d\u0e07\u0e04\u0e38\u0e13\u0e40\u0e1e\u0e37\u0e48\u0e2d\u0e42\u0e08\u0e21\u0e15\u0e35\u0e1c\u0e39\u0e49\u0e2d\u0e37\u0e48\u0e19 \u0e2b\u0e23\u0e37\u0e2d\u0e2a\u0e23\u0e49\u0e32\u0e07\u0e04\u0e27\u0e32\u0e21\u0e40\u0e2a\u0e35\u0e22\u0e2b\u0e32\u0e22\u0e43\u0e2b\u0e49\u0e01\u0e31\u0e1a\u0e23\u0e30\u0e1a\u0e1a\u0e02\u0e2d\u0e07\u0e04\u0e38\u0e13<\/p>
\u0e2b\u0e19\u0e49\u0e32\u0e23\u0e38\u0e01\u0e23\u0e32\u0e19\u0e1a\u0e32\u0e07\u0e2a\u0e48\u0e27\u0e19\u0e08\u0e07\u0e43\u0e08\u0e41\u0e08\u0e01\u0e08\u0e48\u0e32\u0e22\u0e0b\u0e2d\u0e1f\u0e15\u0e4c\u0e41\u0e27\u0e23\u0e4c\u0e17\u0e35\u0e48\u0e40\u0e1b\u0e47\u0e19\u0e2d\u0e31\u0e19\u0e15\u0e23\u0e32\u0e22 \u0e41\u0e15\u0e48\u0e2b\u0e25\u0e32\u0e22\u0e2b\u0e19\u0e49\u0e32\u0e01\u0e47\u0e16\u0e39\u0e01\u0e1a\u0e38\u0e01\u0e23\u0e38\u0e01\u0e42\u0e14\u0e22\u0e17\u0e35\u0e48\u0e40\u0e08\u0e49\u0e32\u0e02\u0e2d\u0e07\u0e44\u0e21\u0e48\u0e17\u0e23\u0e32\u0e1a\u0e2b\u0e23\u0e37\u0e2d\u0e44\u0e21\u0e48\u0e44\u0e14\u0e49\u0e2d\u0e19\u0e38\u0e0d\u0e32\u0e15<\/p>","tl":"
Susubukan ng mga attack page na mag-install ng mga program upang nakawin ang inyong mga private information, o gamitin ang inyong kompyuter upang mapahamak ang iba, o 'di kaya'y sirain ang inyong sistema.<\/p>
Sinasadya ng iilang attack pages na magkalat ng nakakasasamang software, ngunit karamihan ay na-compromise na lingid sa kaalaman o walang pahintulot sa mga may-ari.<\/p>","tr":"
Sald\u0131r\u0131 siteleri; \u00f6zel bilgilerinizi \u00e7alan, bilgisayar\u0131n\u0131z\u0131 ba\u015fkalar\u0131na sald\u0131rmak i\u00e7in kullanan ve sisteminize zarar veren programlar\u0131 kurmaya \u00e7al\u0131\u015f\u0131r.<\/p>
Baz\u0131 sald\u0131r\u0131 siteleri zararl\u0131 yaz\u0131l\u0131mlar\u0131 bilerek da\u011f\u0131t\u0131r ama \u00e7o\u011fu site, sahiplerinin bilgisi ve izni d\u0131\u015f\u0131nda ele ge\u00e7irilerek bu ama\u00e7la kullan\u0131l\u0131r.<\/p>","trs":"
Nej sitio nayi'n\u00efnj ma'an na ni a'n\u00edn nej ma programa ga'ue gi'iaj tu nej nuguan' a'min rayi'\u00eet, asi araj sun ma si gaga't da' gi'iaj yi'\u00ec ma si gaga' a'ng\u00f4 nej dugu\u00ee'.<\/p>
Hua da'aj nej sitio dan ni 'iaj yi'\u00ec ma si gaga't ni a'ng\u00f4 da'aj ma nayi'n\u00efnj ma'an<\/p>","uk":"
\u041d\u0430\u043f\u0430\u0434\u043d\u0438\u0446\u044c\u043a\u0456 \u0441\u0442\u043e\u0440\u0456\u043d\u043a\u0438 \u043d\u0430\u043c\u0430\u0433\u0430\u044e\u0442\u044c\u0441\u044f \u0432\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u0438 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u0438 \u0449\u043e \u043a\u0440\u0430\u0434\u0443\u0442\u044c \u043a\u043e\u043d\u0444\u0456\u0434\u0435\u043d\u0446\u0456\u0439\u043d\u0443 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u044e, \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u043e\u0432\u0443\u044e\u0442\u044c \u0432\u0430\u0448 \u043a\u043e\u043c\u043f\u2019\u044e\u0442\u0435\u0440 \u0434\u043b\u044f \u043f\u043e\u0434\u0430\u043b\u044c\u0448\u0438\u0445 \u0430\u0442\u0430\u043a \u0447\u0438 \u0443\u0448\u043a\u043e\u0434\u0436\u0443\u044e\u0442\u044c \u0432\u0430\u0448\u0443 \u0441\u0438\u0441\u0442\u0435\u043c\u0443.<\/p>
\u0414\u0435\u044f\u043a\u0456 \u043d\u0430\u043f\u0430\u0434\u043d\u0438\u0446\u044c\u043a\u0456 \u0441\u0442\u043e\u0440\u0456\u043d\u043a\u0438 \u043d\u0430\u0432\u043c\u0438\u0441\u043d\u043e \u0440\u043e\u0437\u043f\u043e\u0432\u0441\u044e\u0434\u0436\u0443\u044e\u0442\u044c \u0448\u043a\u0456\u0434\u043b\u0438\u0432\u0456 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u0438, \u043f\u0440\u043e\u0442\u0435 \u0447\u0438\u043c\u0430\u043b\u043e \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u043e\u0432\u0443\u044e\u0442\u044c\u0441\u044f \u0432\u0442\u0435\u043c\u043d\u0443, \u0431\u0435\u0437 \u0432\u0456\u0434\u043e\u043c\u0430 \u0442\u0430 \u0434\u043e\u0437\u0432\u043e\u043b\u0443 \u0457\u0445 \u0445\u0430\u0437\u044f\u0457\u0432.<\/p>","ur":"
\u0627\u0679\u06cc\u06a9 \u067e\u06cc\u062c \u0627\u06cc\u0633\u06d2 \u067e\u0631\u0648\u06af\u0631\u0627\u0645 \u062a\u0646\u0635\u06cc\u0628 \u06a9\u0631\u0646\u06d2 \u06a9\u06cc \u06a9\u0648\u0634\u0634 \u06a9\u0631\u062a\u06d2 \u06c1\u06cc\u06ba \u062c\u0648 \u0646\u062c\u06cc \u0645\u0639\u0644\u0648\u0645\u0627\u062a \u0686\u0648\u0631\u06cc \u06a9\u0631\u062a\u06cc \u06c1\u06d2\u060c \u0622\u067e \u06a9\u0627 \u06a9\u0645\u067e\u06cc\u0648\u0679\u0631 \u062f\u0648\u0633\u0631\u0648\u06ba \u067e\u0631 \u062d\u0645\u0644\u06c1 \u06a9\u0631\u0646\u06d2 \u06a9\u06d2 \u0644\u06cc\u06d2 \u0627\u0633\u062a\u0639\u0645\u0627\u0644 \u06a9\u0631\u062a\u06d2 \u06c1\u06cc\u06ba\u060c \u06cc\u0627 \u0622\u067e \u06a9\u0627 \u0646\u0638\u0627\u0645 \u062e\u0631\u0627\u0628 \u06a9\u0631\u062a\u06d2 \u06c1\u06cc\u06ba\u06d4<\/p>
\u06a9\u0686\u06be \u0627\u0679\u06cc\u06a9 \u067e\u06cc\u062c \u062c\u0627\u0646 \u06a9\u0631 \u0645\u0636\u0631 \u0633\u0627\u0641\u0679 \u0648\u06cc\u0626\u0631 \u0628\u0627\u0646\u0679\u062a\u06d2 \u06c1\u06cc\u06ba\u060c \u0644\u06cc\u06a9\u0646 \u06a9\u0627\u0641\u06cc \u0633\u06d2 \u06cc\u06c1 \u0627\u067e\u0646\u06d2 \u0645\u0627\u0644\u06a9\u06cc\u0646 \u06a9\u06cc \u0627\u062c\u0627\u0632\u062a \u06a9\u06d2 \u0628\u063a\u06cc\u0631 \u06a9\u0631\u062a\u06d2 \u06c1\u06cc\u06ba\u06d4<\/p>","uz":"
Hujum saytlari shaxsiy ma\u2019lumotlaringizni o\u2018g\u2018irlaydigan dasturlarni o\u2018rnatishga urinadi. Bu ma\u2019lumotlar orqali kompyuteringizdan boshqalarga hujum qilish uchun yoki tizimingizni buzish uchun foydalaniladi.<\/p>
Ba\u2019zi hujum sahifalari zararli dasturlarni tarqatadi, ammo ularning ko\u2018pchiligini egalari bilmaydi.<\/p>","vi":"
Trang \u00e1c \u00fd c\u1ed1 g\u1eafng c\u00e0i \u0111\u1eb7t c\u00e1c ch\u01b0\u01a1ng tr\u00ecnh \u0111\u1ec3 \u0103n c\u1eafp th\u00f4ng tin c\u00e1 nh\u00e2n, d\u00f9ng m\u00e1y c\u1ee7a b\u1ea1n \u0111\u1ec3 t\u1ea5n c\u00f4ng m\u00e1y kh\u00e1c, ho\u1eb7c l\u00e0m h\u01b0 h\u1ec7 th\u1ed1ng c\u1ee7a b\u1ea1n.<\/p>
M\u1ed9t s\u1ed1 trang \u00e1c \u00fd c\u1ed1 t\u00ecnh ph\u00e2n ph\u1ed1i ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i, nh\u01b0ng \u0111a s\u1ed1 \u0111\u00e3 b\u1ecb s\u1eeda \u0111\u1ed5i m\u00e0 kh\u00f4ng \u0111\u01b0\u1ee3c ph\u00e9p ho\u1eb7c ng\u01b0\u1eddi s\u1edf h\u1eefu kh\u00f4ng \u0111\u01b0\u1ee3c bi\u1ebft.<\/p>","wo":"
X\u00ebt yu bon yi da\u00f1uy j\u00e9em a samp ay j\u00ebfekaay yuy s\u00e0cc say xibaar, di j\u00ebfandikoo sa nosukaay ngir song yeneen walla \u00f1u yaq sa noste.<\/p>
X\u00ebt yu bari da\u00f1uy tay di y\u00f3nnee ay j\u00ebfekaay yu bon, wante it x\u00ebt yu bari man na\u00f1oo taq te seen boroom du ko xam.<\/p>","xh":"
Amakhasi ohlaselo azama ukufaka iiprogram eziba inkcazelo yangasese, zisebenzise ikhompyutha yakho ukuhlasela ezinye okanye ukonakalisa ikhompyutha yakho.<\/p>
Amanye amakhasi ohlaselo asasaza ngenjongo isoftwe enobungozi, kodwa amaninzi ayadlelelelwa ngaphandle kolwazi okanye imvume yabaniniwo<\/p>","zh-CN":"
\u6709\u653b\u51fb\u884c\u4e3a\u7684\u7f51\u9875\u4f1a\u5c1d\u8bd5\u5b89\u88c5\u80fd\u7a83\u53d6\u4e2a\u4eba\u9690\u79c1\u3001\u5229\u7528\u60a8\u7684\u7535\u8111\u653b\u51fb\u4ed6\u4eba\uff0c\u6216\u8005\u635f\u5bb3\u60a8\u7684\u7cfb\u7edf\u7684\u7a0b\u5e8f\u3002<\/p>
\u67d0\u4e9b\u653b\u51fb\u9875\u9762\u662f\u5728\u6545\u610f\u6563\u5e03\u6709\u5bb3\u8f6f\u4ef6\uff0c\u4f46\u66f4\u591a\u7f51\u7ad9\u5219\u662f\u5728\u8fde\u7f51\u7ad9\u6240\u6709\u8005\u90fd\u4e0d\u77e5\u60c5\u7684\u60c5\u51b5\u4e0b\uff0c\u6210\u4e3a\u4e86\u6076\u610f\u8f6f\u4ef6\u6563\u5e03\u7684\u6e29\u5e8a\u3002<\/p>","zh-TW":"
\u6709\u5bb3\u7db2\u9801\u6703\u5617\u8a66\u5b89\u88dd\u80fd\u7aca\u53d6\u96b1\u79c1\u8cc7\u8a0a\u3001\u5229\u7528\u60a8\u7684\u96fb\u8166\u653b\u64ca\u4ed6\u4eba\u6216\u7834\u58de\u4f5c\u696d\u7cfb\u7d71\u7b49\u7684\u60e1\u610f\u8edf\u9ad4\u5230\u60a8\u7684\u96fb\u8166\u4e0a\u3002<\/p>
\u67d0\u4e9b\u6709\u5bb3\u7db2\u9801\u6703\u6545\u610f\u5b89\u88dd\u6709\u5bb3\u8edf\u9ad4\u5230\u96fb\u8166\u4e0a\uff0c\u4f46\u66f4\u591a\u7db2\u9801\u662f\u5728\u9023\u7db2\u9801\u64c1\u6709\u8005\u90fd\u4e0d\u77e5\u60c5\u7684\u60c5\u6cc1\u4e0b\uff0c\u6210\u70ba\u6709\u5bb3\u8edf\u9ad4\u6563\u4f48\u7684\u6eab\u5e8a\u3002<\/p>"}