swinepox virus - определение. Что такое swinepox virus
Diclib.com
Словарь ChatGPT
Введите слово или словосочетание на любом языке 👆
Язык:     

Перевод и анализ слов искусственным интеллектом ChatGPT

На этой странице Вы можете получить подробный анализ слова или словосочетания, произведенный с помощью лучшей на сегодняшний день технологии искусственного интеллекта:

  • как употребляется слово
  • частота употребления
  • используется оно чаще в устной или письменной речи
  • варианты перевода слова
  • примеры употребления (несколько фраз с переводом)
  • этимология

Что (кто) такое swinepox virus - определение

COMPUTER WORM
ExploreZip virus; Explorezip virus; Worm.ExploreZip virus; Explorezip

Suipoxvirus         
GENUS OF VIRUSES
Swinepox; Swinepox virus; Swine pox; Variola porcina
Suipoxvirus is a genus of viruses in the family Poxviridae and subfamily Chordopoxvirinae. Swine serve as natural hosts.
Pipistrel Virus         
  • Pipistrel Virus cockpit
  • Pipistrel Virus SW
1999 LIGHT AIRCRAFT
Pipistrel Virus SW
The Pipistrel Virus is a two-seat, single engine light aircraft, manufactured by Pipistrel in Slovenia and Italy, and sold as an ultralight, homebuilt kit, or light-sport aircraft.Vandermeullen, Richard: 2012 Kit Aircraft Buyer's Guide, Kitplanes, Volume 28, Number 12, December 2011, page 63.
Monkeypox virus         
  • Colorized transmission electron micrograph of monkeypox virus particles (green)
  • 250x250px
  • pmid=35928395}}</ref>
  • 736x736px
SPECIES OF THE GENUS ORTHOPOXVIRUS
Monkeypox virus (MPV); MPXV; Moneypox virus; HMPXV; Monkeypox virus (MPXV); Mpox virus
Monkeypox virus (MPV, MPXV, or hMPXV) is a species of double-stranded DNA virus which causes monkeypox in humans and other animals. It belongs to the genus Orthopoxvirus in the family Poxviridae.

Википедия

ExploreZip

ExploreZip (also known as I-Worm.ZippedFiles) is a destructive computer worm that attacks machines running Microsoft Windows. It was first discovered in Israel on June 6, 1999. The worm contains a malicious payload, and utilizes Microsoft Outlook, Outlook Express, or Exchange to mail itself out by replying to unread messages in the user's inbox. The worm also searches mapped drives and networked computers for Windows installations. If found, it copies itself to the Windows folder of the remote computer and then modifies the Win.ini file of the infected computer. On January 8, 2003, Symantec discovered a packed variant of this threat which exhibits the same characteristics.