TERMIUM Plus®
The Government of Canada’s terminology and linguistic data bank.
INFECTER UTILISATEUR [7 records]
Record 1 - internal organization data 2019-07-12
Record 1, English
Record 1, Subject field(s)
- Collaborative and Social Communications
- Internet and Telematics
Record 1, Main entry term, English
- profile page
1, record 1, English, profile%20page
correct
Record 1, Abbreviations, English
Record 1, Synonyms, English
Record 1, Textual support, English
Record 1, French
Record 1, Domaine(s)
- Communications collaboratives et sociales
- Internet et télématique
Record 1, Main entry term, French
- page de profil
1, record 1, French, page%20de%20profil
correct, feminine noun
Record 1, Abbreviations, French
Record 1, Synonyms, French
Record 1, Textual support, French
Record number: 1, Textual support number: 1 CONT
Tout utilisateur la visitant exécuterait le code de l'attaque, lequel s’insérerait lui-même sur la page de profil de la victime, prêt à infecter quiconque la consulterait. 2, record 1, French, - page%20de%20profil
Record 1, Spanish
Record 1, Campo(s) temático(s)
- Comunicaciones colaborativas y sociales
- Internet y telemática
Record 1, Main entry term, Spanish
- página del perfil
1, record 1, Spanish, p%C3%A1gina%20del%20perfil
correct, feminine noun
Record 1, Abbreviations, Spanish
Record 1, Synonyms, Spanish
Record 1, Textual support, Spanish
Record 2 - internal organization data 2010-03-01
Record 2, English
Record 2, Subject field(s)
- IT Security
Record 2, Main entry term, English
- infected with a virus
1, record 2, English, infected%20with%20a%20virus
correct
Record 2, Abbreviations, English
Record 2, Synonyms, English
Record 2, Textual support, English
Record number: 2, Textual support number: 1 CONT
Trojan horses are often used as a means of infecting an unsuspecting user with a virus. If a legitimate program becomes infected with a virus, it becomes a Trojan horse and if a user executes it in the belief that he is executing a bonafide copy, his computer will become infected. 1, record 2, English, - infected%20with%20a%20virus
Record 2, French
Record 2, Domaine(s)
- Sécurité des TI
Record 2, Main entry term, French
- contaminé par un virus
1, record 2, French, contamin%C3%A9%20par%20un%20virus
correct
Record 2, Abbreviations, French
Record 2, Synonyms, French
- infecté par un virus 2, record 2, French, infect%C3%A9%20par%20un%20virus
proposal
Record 2, Textual support, French
Record number: 2, Textual support number: 1 CONT
Les Chevaux de Troie servent souvent à infecter un utilisateur peu méfiant. Si un programme normal est contaminé par un virus, il devient lui-même un Cheval de Troie et si un utilisateur l'exécute en pensant exécuter une copie correcte, son ordinateur sera infecté. 1, record 2, French, - contamin%C3%A9%20par%20un%20virus
Record 2, Spanish
Record 2, Textual support, Spanish
Record 3 - internal organization data 2010-03-01
Record 3, English
Record 3, Subject field(s)
- IT Security
Record 3, Main entry term, English
- infect an unsuspecting user
1, record 3, English, infect%20an%20unsuspecting%20user
proposal
Record 3, Abbreviations, English
Record 3, Synonyms, English
Record 3, Textual support, English
Record number: 3, Textual support number: 1 OBS
Trojan horses are often used as a means of infecting an unsuspecting user with a virus. If a legitimate program becomes infected with a virus, it becomes a Trojan horse and if a user executes it in the belief that he is executing a bonafide copy, his computer will become infected. 2, record 3, English, - infect%20an%20unsuspecting%20user
Record 3, French
Record 3, Domaine(s)
- Sécurité des TI
Record 3, Main entry term, French
- infecter un utilisateur peu méfiant
1, record 3, French, infecter%20un%20utilisateur%20peu%20m%C3%A9fiant
correct
Record 3, Abbreviations, French
Record 3, Synonyms, French
Record 3, Textual support, French
Record number: 3, Textual support number: 1 CONT
Les Chevaux de Troie servent souvent à infecter un utilisateur peu méfiant. Si un programme normal est contaminé par un virus, il devient lui-même un Cheval de Troie et si un utilisateur l'exécute en pensant exécuter une copie correcte, son ordinateur sera infecté. 1, record 3, French, - infecter%20un%20utilisateur%20peu%20m%C3%A9fiant
Record 3, Spanish
Record 3, Textual support, Spanish
Record 4 - internal organization data 2010-03-01
Record 4, English
Record 4, Subject field(s)
- IT Security
Record 4, Main entry term, English
- unsuspecting user
1, record 4, English, unsuspecting%20user
correct
Record 4, Abbreviations, English
Record 4, Synonyms, English
Record 4, Textual support, English
Record number: 4, Textual support number: 1 CONT
Trojan horses are often used as a means of infecting an unsuspecting user with a virus. If a legitimate program becomes infected with a virus, it becomes a Trojan horse and if a user executes it in the belief that he is executing a bonafide copy, his computer will become infected. 1, record 4, English, - unsuspecting%20user
Record 4, French
Record 4, Domaine(s)
- Sécurité des TI
Record 4, Main entry term, French
- utilisateur peu méfiant
1, record 4, French, utilisateur%20peu%20m%C3%A9fiant
correct, masculine noun
Record 4, Abbreviations, French
Record 4, Synonyms, French
- utilisateur non méfiant 1, record 4, French, utilisateur%20non%20m%C3%A9fiant
correct, masculine noun
Record 4, Textual support, French
Record number: 4, Textual support number: 1 CONT
Les Chevaux de Troie servent souvent à infecter un utilisateur peu méfiant. Si un programme normal est contaminé par un virus, il devient lui-même un Cheval de Troie et si un utilisateur l'exécute en pensant exécuter une copie correcte, son ordinateur sera infecté. 1, record 4, French, - utilisateur%20peu%20m%C3%A9fiant
Record 4, Spanish
Record 4, Textual support, Spanish
Record 5 - internal organization data 2010-03-01
Record 5, English
Record 5, Subject field(s)
- IT Security
Record 5, Main entry term, English
- infect a user
1, record 5, English, infect%20a%20user
proposal
Record 5, Abbreviations, English
Record 5, Synonyms, English
Record 5, Textual support, English
Record number: 5, Textual support number: 1 OBS
Trojan horses are often used as a means of infecting an unsuspecting user with a virus. If a legitimate program becomes infected with a virus, it becomes a Trojan horse and if a user executes it in the belief that he is executing a bonafide copy, his computer will become infected. 2, record 5, English, - infect%20a%20user
Record 5, French
Record 5, Domaine(s)
- Sécurité des TI
Record 5, Main entry term, French
- infecter un utilisateur
1, record 5, French, infecter%20un%20utilisateur
correct
Record 5, Abbreviations, French
Record 5, Synonyms, French
Record 5, Textual support, French
Record number: 5, Textual support number: 1 CONT
Les Chevaux de Troie servent souvent à infecter un utilisateur peu méfiant. Si un programme normal est contaminé par un virus, il devient lui-même un Cheval de Troie et si un utilisateur l'exécute en pensant exécuter une copie correcte, son ordinateur sera infecté. 1, record 5, French, - infecter%20un%20utilisateur
Record 5, Spanish
Record 5, Textual support, Spanish
Record 6 - internal organization data 2010-02-17
Record 6, English
Record 6, Subject field(s)
- IT Security
Record 6, Main entry term, English
- candidate file
1, record 6, English, candidate%20file
correct
Record 6, Abbreviations, English
Record 6, Synonyms, English
Record 6, Textual support, English
Record number: 6, Textual support number: 1 CONT
Some viruses use a complex mechanism to determine whether or not to infect the current file. Sometimes, instead of infecting the uninfected candidate file, they will instead manipulate the FATs to exchange the uninfected candidate file with the currently executed file without renaming it, so that the user thinks he is executing one file when in effect he is actually executing another one. 1, record 6, English, - candidate%20file
Record 6, French
Record 6, Domaine(s)
- Sécurité des TI
Record 6, Main entry term, French
- fichier candidat
1, record 6, French, fichier%20candidat
correct, masculine noun
Record 6, Abbreviations, French
Record 6, Synonyms, French
Record 6, Textual support, French
Record number: 6, Textual support number: 1 CONT
Certains virus sont dotés de mécanismes complexes pour déterminer s’il doivent contaminer le fichier courant. Parfois, au lieu d’infecter le fichier candidat inaltéré, le virus manipule les FAT pour échanger le fichier candidat inaltéré contre le fichier courant exécuté sans le renommer, de sorte que l'utilisateur pense exécuter un fichier donné alors qu'il en exécute un autre. 1, record 6, French, - fichier%20candidat
Record 6, Spanish
Record 6, Textual support, Spanish
Record 7 - internal organization data 2010-02-17
Record 7, English
Record 7, Subject field(s)
- IT Security
Record 7, Main entry term, English
- uninfected candidate file
1, record 7, English, uninfected%20candidate%20file
correct
Record 7, Abbreviations, English
Record 7, Synonyms, English
Record 7, Textual support, English
Record number: 7, Textual support number: 1 CONT
Some viruses use a complex mechanism to determine whether or not to infect the current file. Sometimes, instead of infecting the uninfected candidate file, they will instead manipulate the FATs to exchange the uninfected candidate file with the currently executed file without renaming it, so that the user thinks he is executing one file when in effect he is actually executing another one. 1, record 7, English, - uninfected%20candidate%20file
Record 7, French
Record 7, Domaine(s)
- Sécurité des TI
Record 7, Main entry term, French
- fichier candidat inaltéré
1, record 7, French, fichier%20candidat%20inalt%C3%A9r%C3%A9
correct, masculine noun
Record 7, Abbreviations, French
Record 7, Synonyms, French
Record 7, Textual support, French
Record number: 7, Textual support number: 1 CONT
Certains virus sont dotés de mécanismes complexes pour déterminer s’il doivent contaminer le fichier courant. Parfois, au lieu d’infecter le fichier candidat inaltéré, le virus manipule les FAT pour échanger le fichier candidat inaltéré contre le fichier courant exécuté sans le renommer, de sorte que l'utilisateur pense exécuter un fichier donné alors qu'il en exécute un autre. 1, record 7, French, - fichier%20candidat%20inalt%C3%A9r%C3%A9
Record 7, Spanish
Record 7, Textual support, Spanish
Copyright notice for the TERMIUM Plus® data bank
© Public Services and Procurement Canada, 2025
TERMIUM Plus®, the Government of Canada's terminology and linguistic data bank
A product of the Translation Bureau
Features
Language Portal of Canada

Access a collection of Canadian resources on all aspects of English and French, including quizzes.
Writing tools

The Language Portal’s writing tools have a new look! Easy to consult, they give you access to a wealth of information that will help you write better in English and French.
Glossaries and vocabularies

Access Translation Bureau glossaries and vocabularies.
- Date Modified: