Worm Sample Clauses

Worm. A worm is similar to a virus. They replicate themselves like viruses, but do not alter files like viruses do. The main difference is that worms reside in memory and usually remain unnoticed until the rate of replication reduces system resources to the point that it becomes noticeable, e.g. when they generate high network traffic. Trojan horses A Trojan horse is called such as a reference to the story of the Trojan horse from Greek legend. It is a malicious program disguised as a normal application. Trojan horse programs do not replicate themselves like a virus, but they can be propagated as attachments to a virus. Such a malicious code can be used for an unauthorized person to get remote control of the platform on which it has been furtively installed. Macro Viruses A macro virus is a computer virus that “infects” a Microsoft Word or similar application and causes a sequence of actions to be performed automatically when the application is started or something else triggers it. Macro viruses tend to be surprising but relatively harmless. A typical effect is the undesired insertion of some comic text at certain points when writing a line. A macro virus is often spread as an e-mail virus. A well-known example in March, 1999 was the Xxxxxxx virus.
AutoNDA by SimpleDocs

Related to Worm

  • Blacklisting The Contractor must not commit any breach of the Employment Relations Xxx 0000 (Blacklists) Regulations 2010 or section 137 of the Trade Union and Labour Relations (Consolidation) Xxx 0000, or commit any breach of the Data Protection Laws by unlawfully processing personal data in connection with any blacklisting activities. Breach of this clause is a material default which shall entitle the Authority to terminate the Framework Agreement.

  • Virus Management Transfer Agent shall maintain a malware protection program designed to deter malware infections, detect the presence of malware within the Transfer Agent environment.

  • Mobile Banking If Mobile Banking is activated for your account(s), you will be required to use secure login information to access the account(s). At the present time, you may use Mobile Banking to: - Deposit checks to your savings and checking accounts. - Withdraw funds from your savings, checking, and money market accounts. - Transfer funds from your savings, checking, and money market accounts. - Obtain balance information for your savings, checking, and money market accounts. - Make loan payments from your savings, checking, and money market accounts. - Determine if a particular item has cleared. - Verify the last date and amount of your payroll deposit. Your accounts can be accessed under Mobile Banking via mobile device or other approved access device(s). Mobile Banking will be available for your convenience 24 hours per day. This service may be interrupted for a short time each day for data processing. We reserve the right to refuse any transaction which would draw upon insufficient funds, exceed a credit limit, lower an account below a required balance, or otherwise require us to increase our required reserve on the account. All checks are payable to you as a primary member and will be mailed to your address of record. We may set other limits on the amount of any transaction, and you will be notified of those limits. We may refuse to honor any transaction for which you do not have sufficient available verified funds. The service will discontinue if no transaction is entered after numerous unsuccessful attempts to enter a transaction and there may be limits on the duration of each access. The following limitations on Mobile Banking transactions may apply: - There is no limit to the number of inquiries, transfers, or withdrawal requests you may make in any one (1) day. - See Section 2 for transfer limitations that may apply to these transactions.

  • White Pages Listings 5.1 BellSouth shall provide <<customer_name>> and their customers access to white pages directory listings under the following terms:

  • Generelt A. Apple Inc. (“Apple”) giver hermed licenstager licens til at bruge Apples software samt tredjeparters software, dokumentation, grænseflader, indhold, skrifter og evt. data, som følger med denne licens, uanset om de forefindes som ROM (Read Only Memory) eller på andet medie (under et kaldet “Apple- software”) i henhold til betingelserne i denne licensaftale. Apple og/eller Apples licensgivere bevarer ejendomsretten til selve Apple-softwaren og forbeholder sig alle de rettigheder, som ikke udtrykkeligt er givet til licenstager.

  • Network Management 60.1 CLEC and CenturyLink will exchange appropriate information (e.g., network information, maintenance contact numbers, escalation procedures, and information required to comply with requirements of law enforcement and national security agencies) for network management purposes. In addition, the Parties will apply sound network management principles to alleviate or to prevent traffic congestion and to minimize fraud associated with third number billed calls, calling card calls, and other services related to this Agreement.

  • DIRECT MARKETING Prior to the introduction of any new product or service which Competitive Supplier may wish to make available to Participating Consumers or other Eligible Consumers located within the Town, Competitive Supplier agrees to (i) give the Town written notice of such new product or service and (ii) subject to the entry into reasonable confidentiality terms to the extent permitted by law and mutually acceptable to the Parties, discuss with the Town the possible inclusion of such new product or service in this aggregation program. The Parties agree to negotiate in good faith the terms, conditions, and prices for such products and services which the Parties agree should be included in a Town aggregation program. Competitive Supplier also agrees not to engage in any direct marketing to any Participating Consumer that relies upon Competitive Supplier’s unique knowledge of, or access to, Participating Consumers gained as a result of this ESA. For the purposes of this provision, “direct marketing” shall include any telephone call, mailing, electronic mail, or other contact between the Competitive Supplier and the Consumer. Broad-based programs of the Competitive Supplier that do not rely on unique knowledge or access gained through this ESA will not constitute such “direct marketing.”

  • Online Banking (a) Utilize Bank’s online banking platform for all matters requested by Bank which shall include, without limitation (and without request by Bank for the following matters), uploading information pertaining to Accounts and Account Debtors, requesting approval for exceptions, requesting Credit Extensions, and uploading financial statements and other reports required to be delivered by this Agreement (including, without limitation, those described in Section 6.2 of this Agreement).

  • VOETSTOOTS The PROPERTY is sold:

  • Programming (a) Pursuant to Section 624 of the Cable Act, the Licensee shall maintain the mix, quality and broad categories of Programming set forth in Exhibit 4, attached hereto and made a part hereof. Pursuant to applicable federal law, all Programming decisions, including the Programming listed in Exhibit 4, attached hereto, shall be at the sole discretion of the Licensee.

Time is Money Join Law Insider Premium to draft better contracts faster.