Trojan Horses
In this context, a Trojan horse could be defined as an application that appears to be benign, but instead performs some type of malicious activity. A Trojan can be disguised as a game, an e-mail attachment, or even a Web page. As soon as the victim runs or opens the camouflaged application, the Trojan installs itself on the hard drive and then runs each time Windows is started.
In this context, a Trojan horse could be defined as an application that appears to be benign, but instead performs some type of malicious activity. A Trojan can be disguised as a game, an e-mail attachment, or even a Web page. As soon as the victim runs or opens the camouflaged application, the Trojan installs itself on the hard drive and then runs each time Windows is started.
No comments:
Post a Comment