. "Ein Drive-by-Download ist das unbewusste (englisch drive-by \u201Aim Vorbeifahren\u2018) und unbeabsichtigte Herunterladen (Download) von Software auf einen Rechner. Unter anderem wird damit das unerw\u00FCnschte Herunterladen von Schadsoftware allein durch das Aufrufen einer daf\u00FCr pr\u00E4parierten Webseite bezeichnet. Dabei werden Sicherheitsl\u00FCcken des Browsers oder des Betriebssystems ausgenutzt, denn laut Definition sollte mit HTML-Inhalten oder Browser-Skriptsprachen ein Zugriff au\u00DFerhalb der Browser-Umgebung ohne Benutzerinteraktion nicht m\u00F6glich sein."@de . . . . . . . . . . . . "Drive-by download (em portugu\u00EAs literal, \"conduzir atrav\u00E9s de download\") significa duas coisas, ambas relativas \u00E0 transfer\u00EAncia n\u00E3o intencional de software a partir da Internet: 1. \n* Downloads que uma pessoa autorizada, mas sem a compreens\u00E3o das consequ\u00EAncias (por exemplo, downloads que instalam um programa execut\u00E1vel desconhecido ou falsificado, como um componente ActiveX ou um applet Java); 2. \n* Qualquer download que acontece sem o conhecimento de uma pessoa, geralmente um v\u00EDrus de computador, um spyware, um malware ou um crimeware. Drive-by downloads podem acontecer quando visita-se um site web, visualiza-se uma mensagem de e-mail ou clica-se em uma janela pop-up enganadora: clicando na janela, na cren\u00E7a equivocada de que, por exemplo, um relat\u00F3rio de erros do sistema operacional do computador est\u00E1 por si s\u00F3 sendo reconhecido; ou que um pop-up de propaganda inofensivo est\u00E1 sendo recusado. Nesses casos, o \"fornecedor\" pode alegar que o usu\u00E1rio \"consentiu\" a transfer\u00EAncia, embora, na verdade, o usu\u00E1rio n\u00E3o tinha conhecimento de ter iniciado um download de software indesejado ou malicioso. Sites web que exploram a vulnerabilidade de Meta-arquivo do Windows (eliminada por uma atualiza\u00E7\u00E3o do Windows de 5 de janeiro de 2006) pode fornecer exemplos de drive-by downloads deste tipo. Os crackers usam diferentes t\u00E9cnicas para ofuscar o c\u00F3digo malicioso, de modo que o software de antiv\u00EDrus n\u00E3o seja capaz de reconhec\u00EA-lo. O c\u00F3digo \u00E9 executado em iframes escondidos, e pode passar despercebido. Um drive-by install (em portugu\u00EAs, \"conduzir atrav\u00E9s de instala\u00E7\u00E3o\") \u00E9 um evento similar. Refere-se a instala\u00E7\u00E3o, em vez de download (embora, \u00E0s vezes, os dois termos sejam usados como sin\u00F4nimos)."@pt . . . . "Drive-by download (em portugu\u00EAs literal, \"conduzir atrav\u00E9s de download\") significa duas coisas, ambas relativas \u00E0 transfer\u00EAncia n\u00E3o intencional de software a partir da Internet: 1. \n* Downloads que uma pessoa autorizada, mas sem a compreens\u00E3o das consequ\u00EAncias (por exemplo, downloads que instalam um programa execut\u00E1vel desconhecido ou falsificado, como um componente ActiveX ou um applet Java); 2. \n* Qualquer download que acontece sem o conhecimento de uma pessoa, geralmente um v\u00EDrus de computador, um spyware, um malware ou um crimeware."@pt . . . . . . "\uB4DC\uB77C\uC774\uBE0C \uBC14\uC774 \uB2E4\uC6B4\uB85C\uB4DC (Drive-by download)\uB294 \uC778\uD130\uB137\uC5D0\uC11C \uCEF4\uD4E8\uD130 \uC18C\uD504\uD2B8\uC6E8\uC5B4\uC758 \uC758\uB3C4\uB418\uC9C0 \uC54A\uC740 \uB2E4\uC6B4\uB85C\uB4DC\uC640 \uAD00\uB828\uD574\uC11C, \uAC01\uAC01 \uB2E4\uC74C\uACFC \uAC19\uC740 \uB450 \uAC00\uC9C0\uB97C \uC758\uBBF8\uD55C\uB2E4: 1. \n* \uACB0\uACFC\uC5D0 \uB300\uD55C \uC774\uD574\uAC00 \uC5C6\uB294 \uAC1C\uC778\uC774 \uD5C8\uAC00\uD55C \uB2E4\uC6B4\uB85C\uB4DC\uB4E4(\uC608\uB97C \uB4E4\uBA74 \uC54C\uB824\uC9C0\uC9C0 \uC54A\uC740 \uC704\uC870 \uC2E4\uD589 \uD30C\uC77C\uC774\uB098, \uC561\uD2F0\uBE0CX \uCEF4\uD3EC\uB10C\uD2B8 \uB610\uB294 \uC790\uBC14 \uC560\uD50C\uB9BF). 2. \n* \uCEF4\uD4E8\uD130 \uBC14\uC774\uB7EC\uC2A4, \uC2A4\uD30C\uC774\uC6E8\uC5B4, \uC545\uC131 \uC18C\uD504\uD2B8\uC6E8\uC5B4 \uAC19\uC740 \uAC1C\uC778\uC758 \uC778\uC2DD \uC5C6\uC774 \uC77C\uC5B4\uB098\uB294 \uB2E4\uC6B4\uB85C\uB4DC. \uB4DC\uB77C\uC774\uBE0C \uBC14\uC774 \uB2E4\uC6B4\uB85C\uB4DC\uB4E4\uC740 \uC6F9 \uC0AC\uC774\uD2B8\uB97C \uBC29\uBB38\uD558\uAC70\uB098 \uC774\uBA54\uC77C \uBA54\uC2DC\uC9C0\uB97C \uBCFC \uB54C \uB610\uB294 \uC720\uD639\uD558\uB294 \uD31D\uC5C5 \uC708\uB3C4\uC6B0\uB97C \uD074\uB9AD\uD560 \uB54C \uBC1C\uC0DD\uD55C\uB2E4: \uC774\uB7EC\uD55C \uACBD\uC6B0\uC5D0 \"\uC81C\uACF5\uC790\"\uB294 \uBE44\uB85D \uC0AC\uC6A9\uC790\uAC00 \uC778\uC9C0\uD558\uC9C0 \uBABB\uD588\uB354\uB77C\uB3C4 \uB2E4\uC6B4\uB85C\uB4DC\uC5D0 \"\uB3D9\uC758\"\uD558\uC600\uB2E4\uACE0 \uC8FC\uC7A5\uD558\uAE30\uB3C4 \uD55C\uB2E4. \uC708\uB3C4\uC6B0 \uBA54\uD0C0\uD30C\uC77C \uCDE8\uC57D\uC810(2006\uB144 1\uC6D4 5\uC77C \uC708\uB3C4\uC6B0 \uC5C5\uB370\uC774\uD2B8\uB85C \uC81C\uAC70\uB41C)\uC774 \uC775\uC2A4\uD50C\uB85C\uC787\uB41C \uC6F9\uC0AC\uC774\uD2B8\uB4E4\uC740 \uC774\uB7EC\uD55C \uC720\uD615\uC758 \uB4DC\uB77C\uC774\uBE0C \uBC14\uC774 \uB2E4\uC6B4\uB85C\uB4DC\uB97C \uC81C\uACF5\uD558\uAE30\uB3C4 \uD55C\uB2E4. \uD574\uCEE4\uB4E4\uC740 \uC545\uC758\uC801\uC778 \uCF54\uB4DC\uB97C \uC228\uAE30\uAE30 \uC704\uD574 \uB2E4\uC591\uD55C \uAE30\uBC95\uB4E4\uC744 \uC0AC\uC6A9\uD574\uC11C, \uBC14\uC774\uB7EC\uC2A4 \uAC80\uC0AC \uC18C\uD504\uD2B8\uC6E8\uC5B4\uAC00 \uC778\uC2DD\uD558\uC9C0 \uBABB\uD558\uAC8C \uD55C\uB2E4. \uC774 \uCF54\uB4DC\uB294 \uC228\uACA8\uC9C4 iframes\uC5D0\uC11C \uC2E4\uD589\uB418\uBA70 \uD0D0\uC9C0\uAC00 \uB418\uC9C0 \uC54A\uC744 \uC218 \uC788\uB2E4."@ko . "Drive-by download"@sv . . . "\u30C9\u30E9\u30A4\u30D6\u30D0\u30A4\u30C0\u30A6\u30F3\u30ED\u30FC\u30C9"@ja . . . . "Drive-by download is of two types, each concerning the unintended download of computer software from the Internet: 1. \n* Authorized drive-by downloads are downloads which a person has authorized but without understanding the consequences (e.g. downloads which install an unknown or counterfeit executable program, ActiveX component, or Java applet). 2. \n* Unauthorized drive-by downloads are downloads which happen without a person's knowledge, often a computer virus, spyware, malware, or crimeware."@en . . "Drive-by-Download"@de . "Drive-by download \u00E4r en term som har flera betydelser. Sammanfattande f\u00F6r dem alla \u00E4r att n\u00E5got laddats ner (vanligtvis fr\u00E5n Internet till anv\u00E4ndarens dator) utan att f\u00F6rst g\u00F6ra anv\u00E4ndaren uppm\u00E4rksam om detta. Nerladdningen best\u00E5r p\u00E5fallande ofta av s\u00E5 kallad adware eller spyware."@sv . . . . . . "\u8DEF\u8FC7\u5F0F\u4E0B\u8F7D\uFF08Drive-by download\uFF09\u662F\u5BF9\u4E92\u8054\u7F51\u4E0A\u7684\u4E00\u79CD\u884C\u4E3A\u7684\u63CF\u8FF0\uFF0C\u4E00\u822C\u8868\u73B0\u4E3A\uFF1A 1. \n* \u4EFB\u4F55\u4E0D\u5E0C\u671B\u7528\u6237\u77E5\u6653\u7684\u4E0B\u8F7D\u884C\u4E3A 2. \n* \u5728\u7528\u6237\u4E0D\u77E5\u9053\u7684\u60C5\u51B5\u4E0B\u4E0B\u8F7D\u95F4\u8C0D\u8F6F\u4EF6\u3001\u8BA1\u7B97\u673A\u75C5\u6BD2\u6216\u8005\u4EFB\u4F55\u6076\u610F\u8F6F\u4EF6\u3002\u8DEF\u8FC7\u5F0F\u4E0B\u8F7D\u53EF\u80FD\u53D1\u751F\u5728\u7528\u6237\u8BBF\u95EE\u4E00\u4E2A\u7F51\u7AD9\u3001\u9605\u8BFB\u4E00\u5C01\u7535\u5B50\u90AE\u4EF6\u3001\u6216\u8005\u70B9\u51FB\u4E00\u4E2A\u6B3A\u9A97\u6027\u5F39\u51FA\u5F0F\u7A97\u53E3\u7684\u65F6\u5019\u3002\u4F8B\u5982\uFF0C\u7528\u6237\u8BEF\u4EE5\u4E3A\u8FD9\u4E2A\u5F39\u51FA\u5F0F\u7A97\u53E3\u662F\u81EA\u5DF1\u7684\u8BA1\u7B97\u673A\u63D0\u793A\u9519\u8BEF\u7684\u7A97\u53E3\u6216\u8005\u4EE5\u4E3A\u8FD9\u662F\u4E00\u4E2A\u6B63\u5E38\u7684\u5F39\u51FA\u5F0F\u5E7F\u544A\uFF0C\u56E0\u6B64\u70B9\u51FB\u4E86\u8FD9\u4E2A\u7A97\u53E3\u3002 \u8DEF\u904E\u5F0F\u5B89\u88DD\u662F\u4E00\u500B\u985E\u4F3C\u7684\u624B\u6BB5\uFF0C\u5B83\u662F\u6307\u4F7F\u4E00\u500B\u7528\u6236\u5728\u4E0D\u77E5\u60C5\u7684\u60C5\u6CC1\u4E0B\u5B89\u88DD\u8EDF\u9AD4\uFF08\u96D6\u7136\u6709\u6642\u5019\u9019\u5169\u500B\u8853\u8A9E\u662F\u53EF\u4EE5\u4E92\u63DB\u7684\uFF09\u3002"@zh . . . "\uB4DC\uB77C\uC774\uBE0C \uBC14\uC774 \uB2E4\uC6B4\uB85C\uB4DC"@ko . "Le terme t\u00E9l\u00E9chargement furtif ou t\u00E9l\u00E9chargement \u00E0 la d\u00E9rob\u00E9e (en anglais, drive-by download ou drive-by install) signifie deux choses, chacune concernant le t\u00E9l\u00E9chargement involontaire de logiciels depuis Internet : De m\u00EAme, un t\u00E9l\u00E9chargement furtif peut se produire lors de la visite d'un site malveillant ou d'un site l\u00E9gitime infect\u00E9. Le contenu malveillant du site peut alors exploiter des vuln\u00E9rabilit\u00E9s du navigateur Web ou de ses modules d'extension (plugins) pour t\u00E9l\u00E9charger sur l'ordinateur de l'internaute du code malveillant \u00E0 son insu."@fr . . . . . "\u30C9\u30E9\u30A4\u30D6\u30D0\u30A4\u30C0\u30A6\u30F3\u30ED\u30FC\u30C9\uFF08Drive-by download\u3001Drive-by download attack\u3001\u901A\u79F0:DBD\u653B\u6483\uFF09\u3068\u306F\u3001\u30A6\u30A7\u30D6\u30D6\u30E9\u30A6\u30B6\u306A\u3069\u3092\u4ECB\u3057\u3066\u3001\u30E6\u30FC\u30B6\u306B\u6C17\u4ED8\u304B\u308C\u306A\u3044\u3088\u3046\u306B\u30BD\u30D5\u30C8\u30A6\u30A7\u30A2\u306A\u3069\u3092\u30C0\u30A6\u30F3\u30ED\u30FC\u30C9\u3055\u305B\u308B\u884C\u70BA\u306E\u3053\u3068\u3067\u3042\u308B\u3002"@ja . "Drive-by-Download"@es . "Ein Drive-by-Download ist das unbewusste (englisch drive-by \u201Aim Vorbeifahren\u2018) und unbeabsichtigte Herunterladen (Download) von Software auf einen Rechner. Unter anderem wird damit das unerw\u00FCnschte Herunterladen von Schadsoftware allein durch das Aufrufen einer daf\u00FCr pr\u00E4parierten Webseite bezeichnet. Dabei werden Sicherheitsl\u00FCcken des Browsers oder des Betriebssystems ausgenutzt, denn laut Definition sollte mit HTML-Inhalten oder Browser-Skriptsprachen ein Zugriff au\u00DFerhalb der Browser-Umgebung ohne Benutzerinteraktion nicht m\u00F6glich sein."@de . . . . . "\u8DEF\u8FC7\u5F0F\u4E0B\u8F7D\uFF08Drive-by download\uFF09\u662F\u5BF9\u4E92\u8054\u7F51\u4E0A\u7684\u4E00\u79CD\u884C\u4E3A\u7684\u63CF\u8FF0\uFF0C\u4E00\u822C\u8868\u73B0\u4E3A\uFF1A 1. \n* \u4EFB\u4F55\u4E0D\u5E0C\u671B\u7528\u6237\u77E5\u6653\u7684\u4E0B\u8F7D\u884C\u4E3A 2. \n* \u5728\u7528\u6237\u4E0D\u77E5\u9053\u7684\u60C5\u51B5\u4E0B\u4E0B\u8F7D\u95F4\u8C0D\u8F6F\u4EF6\u3001\u8BA1\u7B97\u673A\u75C5\u6BD2\u6216\u8005\u4EFB\u4F55\u6076\u610F\u8F6F\u4EF6\u3002\u8DEF\u8FC7\u5F0F\u4E0B\u8F7D\u53EF\u80FD\u53D1\u751F\u5728\u7528\u6237\u8BBF\u95EE\u4E00\u4E2A\u7F51\u7AD9\u3001\u9605\u8BFB\u4E00\u5C01\u7535\u5B50\u90AE\u4EF6\u3001\u6216\u8005\u70B9\u51FB\u4E00\u4E2A\u6B3A\u9A97\u6027\u5F39\u51FA\u5F0F\u7A97\u53E3\u7684\u65F6\u5019\u3002\u4F8B\u5982\uFF0C\u7528\u6237\u8BEF\u4EE5\u4E3A\u8FD9\u4E2A\u5F39\u51FA\u5F0F\u7A97\u53E3\u662F\u81EA\u5DF1\u7684\u8BA1\u7B97\u673A\u63D0\u793A\u9519\u8BEF\u7684\u7A97\u53E3\u6216\u8005\u4EE5\u4E3A\u8FD9\u662F\u4E00\u4E2A\u6B63\u5E38\u7684\u5F39\u51FA\u5F0F\u5E7F\u544A\uFF0C\u56E0\u6B64\u70B9\u51FB\u4E86\u8FD9\u4E2A\u7A97\u53E3\u3002 \u8DEF\u904E\u5F0F\u5B89\u88DD\u662F\u4E00\u500B\u985E\u4F3C\u7684\u624B\u6BB5\uFF0C\u5B83\u662F\u6307\u4F7F\u4E00\u500B\u7528\u6236\u5728\u4E0D\u77E5\u60C5\u7684\u60C5\u6CC1\u4E0B\u5B89\u88DD\u8EDF\u9AD4\uFF08\u96D6\u7136\u6709\u6642\u5019\u9019\u5169\u500B\u8853\u8A9E\u662F\u53EF\u4EE5\u4E92\u63DB\u7684\uFF09\u3002"@zh . "Drive-by-Download"@ca . . . . . . "Drive-by download is of two types, each concerning the unintended download of computer software from the Internet: 1. \n* Authorized drive-by downloads are downloads which a person has authorized but without understanding the consequences (e.g. downloads which install an unknown or counterfeit executable program, ActiveX component, or Java applet). 2. \n* Unauthorized drive-by downloads are downloads which happen without a person's knowledge, often a computer virus, spyware, malware, or crimeware. Drive-by downloads may happen when visiting a website, opening an e-mail attachment or clicking a link, or clicking on a deceptive pop-up window: by clicking on the window in the mistaken belief that, for example, an error report from the computer's operating system itself is being acknowledged or a seemingly innocuous advertisement pop-up is being dismissed. In such cases, the \"supplier\" may claim that the user \"consented\" to the download, although the user was in fact unaware of having started an unwanted or malicious software download. Similarly if a person is visiting a site with malicious content, the person may become victim to a drive-by download attack. That is, the malicious content may be able to exploit vulnerabilities in the browser or plugins to run malicious code without the user's knowledge. A drive-by install (or installation) is a similar event. It refers to installation rather than download (though sometimes the two terms are used interchangeably)."@en . . "1113310631"^^ . . "Drive-by-Download significa dues coses, ambdues referides a la desc\u00E0rrega involunt\u00E0ria de programari d'ordinador provinent d'Internet: 1. \n* Desc\u00E0rregues autoritzades per una persona que no compr\u00E8n les conseq\u00FC\u00E8ncies (p. ex. desc\u00E0rregues que instal\u00B7len autom\u00E0ticament una falsificaci\u00F3 d'un programa executable, component ActiveX, o applet de Java ). 2. \n* Qualsevol desc\u00E0rrega realitzada sense el coneixement d'una persona, sovint un virus d'ordinador, spyware, malware, o crimeware. Un atac Drive-by-Download pot tenir lloc visitant un p\u00E0gina web, visualitzant un missatge de correu electr\u00F2nic, o prement sobre un missatge emergent que mostri informaci\u00F3 enganyosa, per exemple: un informe d'error del sistema operatiu, publicitat aparentment inofensiva,. En tals casos, el \"prove\u00EFdor\" pot reclamar que l'usuari \"permeti\" la desc\u00E0rrega, tot i que l'usuari no sigui conscient del fet d'haver autoritzat aquesta desc\u00E0rrega de programari no desitjada o maliciosa. De manera semblant si una persona est\u00E0 visitant un lloc amb contingut malici\u00F3s, pot arribar a ser v\u00EDctima d'un atac Drive-by-download. El contingut malici\u00F3s pot ser capa\u00E7 d'explotar vulnerabilitats en el navegador o en els seus complements per executar codi maligne sense el coneixement de l'usuari. Un Drive-by-install (o instal\u00B7laci\u00F3) \u00E9s un fet similar. Fa refer\u00E8ncia a la instal\u00B7laci\u00F3 a m\u00E9s a m\u00E9s de la desc\u00E0rrega (aix\u00ED i tot de vegades la difer\u00E8ncia entre els dos termes \u00E9s difusa i s\u00F3n emprats indistintament)."@ca . . "T\u00E9l\u00E9chargement furtif"@fr . . . . "Drive-by download"@en . "Drive-by download \u00E4r en term som har flera betydelser. Sammanfattande f\u00F6r dem alla \u00E4r att n\u00E5got laddats ner (vanligtvis fr\u00E5n Internet till anv\u00E4ndarens dator) utan att f\u00F6rst g\u00F6ra anv\u00E4ndaren uppm\u00E4rksam om detta. Nerladdningen best\u00E5r p\u00E5fallande ofta av s\u00E5 kallad adware eller spyware."@sv . . . "\u8DEF\u8FC7\u5F0F\u4E0B\u8F7D"@zh . . . "Drive-by-Download significa dos cosas, ambas referidas a la descarga involuntaria de software de ordenador proveniente de Internet: 1. \n* Descargas autorizadas por una persona que no comprende las consecuencias (p. ej. descargas que instalan autom\u00E1ticamente una falsificaci\u00F3n de un programa ejecutable, componente ActiveX, o applet de Java ). 2. \n* Cualquier descarga realizada sin el conocimiento de una persona, a menudo un virus de ordenador, spyware, malware, o crimeware.\u200B Drive-by-Download puede suceder visitando un sitio web, visualizando un mensaje de correo electr\u00F3nico, pulsando sobre un mensaje emergente que muestre informaci\u00F3n enga\u00F1osa, por ejemplo: un informe de error del sistema operativo, publicidad aparentemente inofensiva,...\u200B En tales casos, el \"proveedor\" puede reclamar que el usuario \"consinti\u00F3\" la descarga, a pesar de que el usuario era de hecho inconsciente de haber autorizado la dicha descarga de software no deseada o maliciosa. De modo parecido si una persona est\u00E1 visitando un sitio con contenido malicioso, la puede llegar a ser v\u00EDctima de un ataque Drive-by-download. El contenido malicioso puede ser capaz de explotar vulnerabilidades en el navegador o en complementos de este para ejecutar c\u00F3digo maligno sin el conocimiento del usuario.\u200B Un Drive-by-install (o instalaci\u00F3n) es un suceso similar. Hace referencia a la instalaci\u00F3n m\u00E1s que a la descarga (aun as\u00ED a veces la diferencia entre los dos t\u00E9rminos es difusa y estos son empleados indistintamente)."@es . . "\u30C9\u30E9\u30A4\u30D6\u30D0\u30A4\u30C0\u30A6\u30F3\u30ED\u30FC\u30C9\uFF08Drive-by download\u3001Drive-by download attack\u3001\u901A\u79F0:DBD\u653B\u6483\uFF09\u3068\u306F\u3001\u30A6\u30A7\u30D6\u30D6\u30E9\u30A6\u30B6\u306A\u3069\u3092\u4ECB\u3057\u3066\u3001\u30E6\u30FC\u30B6\u306B\u6C17\u4ED8\u304B\u308C\u306A\u3044\u3088\u3046\u306B\u30BD\u30D5\u30C8\u30A6\u30A7\u30A2\u306A\u3069\u3092\u30C0\u30A6\u30F3\u30ED\u30FC\u30C9\u3055\u305B\u308B\u884C\u70BA\u306E\u3053\u3068\u3067\u3042\u308B\u3002"@ja . . . "2008939"^^ . "Drive-by download"@pt . . "Le terme t\u00E9l\u00E9chargement furtif ou t\u00E9l\u00E9chargement \u00E0 la d\u00E9rob\u00E9e (en anglais, drive-by download ou drive-by install) signifie deux choses, chacune concernant le t\u00E9l\u00E9chargement involontaire de logiciels depuis Internet : \n* un t\u00E9l\u00E9chargement qu'une personne a autoris\u00E9 mais sans en comprendre les cons\u00E9quences (par exemple, des t\u00E9l\u00E9chargements qui installent un programme non d\u00E9sir\u00E9 ou malveillant, un composant ActiveX ou un applet Java). \n* un t\u00E9l\u00E9chargement qui se produit \u00E0 l'insu de l'utilisateur, souvent le t\u00E9l\u00E9chargement d'un virus informatique, d'un logiciel espion, d'un autre logiciel malveillant ou d'un logiciel criminel. Un t\u00E9l\u00E9chargement furtif peut se produire lors de la visite d'un site Web, de l'ouverture d'une pi\u00E8ce jointe \u00E0 un courriel, d'un clic sur un lien ou d'un clic sur une fen\u00EAtre surgissante (pop-up) trompeuse. Par exemple, en cliquant sur une fen\u00EAtre surgissante malveillante affichant une publicit\u00E9, un utilisateur peut penser qu'il clique sur un bouton pour fermer la fen\u00EAtre alors que le pirate qui a affich\u00E9 la fen\u00EAtre agira comme si le clic de l'utilisateur \u00E9tait une autorisation \u00E0 t\u00E9l\u00E9charger un logiciel. De m\u00EAme, un t\u00E9l\u00E9chargement furtif peut se produire lors de la visite d'un site malveillant ou d'un site l\u00E9gitime infect\u00E9. Le contenu malveillant du site peut alors exploiter des vuln\u00E9rabilit\u00E9s du navigateur Web ou de ses modules d'extension (plugins) pour t\u00E9l\u00E9charger sur l'ordinateur de l'internaute du code malveillant \u00E0 son insu."@fr . . "Drive-by-Download significa dues coses, ambdues referides a la desc\u00E0rrega involunt\u00E0ria de programari d'ordinador provinent d'Internet: 1. \n* Desc\u00E0rregues autoritzades per una persona que no compr\u00E8n les conseq\u00FC\u00E8ncies (p. ex. desc\u00E0rregues que instal\u00B7len autom\u00E0ticament una falsificaci\u00F3 d'un programa executable, component ActiveX, o applet de Java ). 2. \n* Qualsevol desc\u00E0rrega realitzada sense el coneixement d'una persona, sovint un virus d'ordinador, spyware, malware, o crimeware."@ca . "8180"^^ . . . "Drive-by-Download significa dos cosas, ambas referidas a la descarga involuntaria de software de ordenador proveniente de Internet: 1. \n* Descargas autorizadas por una persona que no comprende las consecuencias (p. ej. descargas que instalan autom\u00E1ticamente una falsificaci\u00F3n de un programa ejecutable, componente ActiveX, o applet de Java ). 2. \n* Cualquier descarga realizada sin el conocimiento de una persona, a menudo un virus de ordenador, spyware, malware, o crimeware.\u200B"@es . . . . . "\uB4DC\uB77C\uC774\uBE0C \uBC14\uC774 \uB2E4\uC6B4\uB85C\uB4DC (Drive-by download)\uB294 \uC778\uD130\uB137\uC5D0\uC11C \uCEF4\uD4E8\uD130 \uC18C\uD504\uD2B8\uC6E8\uC5B4\uC758 \uC758\uB3C4\uB418\uC9C0 \uC54A\uC740 \uB2E4\uC6B4\uB85C\uB4DC\uC640 \uAD00\uB828\uD574\uC11C, \uAC01\uAC01 \uB2E4\uC74C\uACFC \uAC19\uC740 \uB450 \uAC00\uC9C0\uB97C \uC758\uBBF8\uD55C\uB2E4: 1. \n* \uACB0\uACFC\uC5D0 \uB300\uD55C \uC774\uD574\uAC00 \uC5C6\uB294 \uAC1C\uC778\uC774 \uD5C8\uAC00\uD55C \uB2E4\uC6B4\uB85C\uB4DC\uB4E4(\uC608\uB97C \uB4E4\uBA74 \uC54C\uB824\uC9C0\uC9C0 \uC54A\uC740 \uC704\uC870 \uC2E4\uD589 \uD30C\uC77C\uC774\uB098, \uC561\uD2F0\uBE0CX \uCEF4\uD3EC\uB10C\uD2B8 \uB610\uB294 \uC790\uBC14 \uC560\uD50C\uB9BF). 2. \n* \uCEF4\uD4E8\uD130 \uBC14\uC774\uB7EC\uC2A4, \uC2A4\uD30C\uC774\uC6E8\uC5B4, \uC545\uC131 \uC18C\uD504\uD2B8\uC6E8\uC5B4 \uAC19\uC740 \uAC1C\uC778\uC758 \uC778\uC2DD \uC5C6\uC774 \uC77C\uC5B4\uB098\uB294 \uB2E4\uC6B4\uB85C\uB4DC. \uB4DC\uB77C\uC774\uBE0C \uBC14\uC774 \uB2E4\uC6B4\uB85C\uB4DC\uB4E4\uC740 \uC6F9 \uC0AC\uC774\uD2B8\uB97C \uBC29\uBB38\uD558\uAC70\uB098 \uC774\uBA54\uC77C \uBA54\uC2DC\uC9C0\uB97C \uBCFC \uB54C \uB610\uB294 \uC720\uD639\uD558\uB294 \uD31D\uC5C5 \uC708\uB3C4\uC6B0\uB97C \uD074\uB9AD\uD560 \uB54C \uBC1C\uC0DD\uD55C\uB2E4: \uC774\uB7EC\uD55C \uACBD\uC6B0\uC5D0 \"\uC81C\uACF5\uC790\"\uB294 \uBE44\uB85D \uC0AC\uC6A9\uC790\uAC00 \uC778\uC9C0\uD558\uC9C0 \uBABB\uD588\uB354\uB77C\uB3C4 \uB2E4\uC6B4\uB85C\uB4DC\uC5D0 \"\uB3D9\uC758\"\uD558\uC600\uB2E4\uACE0 \uC8FC\uC7A5\uD558\uAE30\uB3C4 \uD55C\uB2E4. \uC708\uB3C4\uC6B0 \uBA54\uD0C0\uD30C\uC77C \uCDE8\uC57D\uC810(2006\uB144 1\uC6D4 5\uC77C \uC708\uB3C4\uC6B0 \uC5C5\uB370\uC774\uD2B8\uB85C \uC81C\uAC70\uB41C)\uC774 \uC775\uC2A4\uD50C\uB85C\uC787\uB41C \uC6F9\uC0AC\uC774\uD2B8\uB4E4\uC740 \uC774\uB7EC\uD55C \uC720\uD615\uC758 \uB4DC\uB77C\uC774\uBE0C \uBC14\uC774 \uB2E4\uC6B4\uB85C\uB4DC\uB97C \uC81C\uACF5\uD558\uAE30\uB3C4 \uD55C\uB2E4. \uD574\uCEE4\uB4E4\uC740 \uC545\uC758\uC801\uC778 \uCF54\uB4DC\uB97C \uC228\uAE30\uAE30 \uC704\uD574 \uB2E4\uC591\uD55C \uAE30\uBC95\uB4E4\uC744 \uC0AC\uC6A9\uD574\uC11C, \uBC14\uC774\uB7EC\uC2A4 \uAC80\uC0AC \uC18C\uD504\uD2B8\uC6E8\uC5B4\uAC00 \uC778\uC2DD\uD558\uC9C0 \uBABB\uD558\uAC8C \uD55C\uB2E4. \uC774 \uCF54\uB4DC\uB294 \uC228\uACA8\uC9C4 iframes\uC5D0\uC11C \uC2E4\uD589\uB418\uBA70 \uD0D0\uC9C0\uAC00 \uB418\uC9C0 \uC54A\uC744 \uC218 \uC788\uB2E4. \uB4DC\uB77C\uC774\uBE0C \uBC14\uC774 \uC124\uCE58 (drive-by install)\uB3C4 \uBE44\uC2B7\uD55C \uACBD\uC6B0\uC774\uB2E4. \uC774\uAC83\uC740 \uB2E4\uC6B4\uB85C\uB4DC \uBCF4\uB2E4\uB294 \uC124\uCE58\uD558\uB294 \uAC83\uC744 \uAC00\uB9AC\uD0A8\uB2E4(\uBE44\uB85D \uB450 \uC6A9\uC5B4\uB4E4\uC774 \uBE44\uC2B7\uD558\uAC8C \uC0AC\uC6A9\uB418\uC9C0\uB9CC)."@ko .