answersLogoWhite

0


Best Answer

I'm not an expert on the subject but this link might shed some light on the topic.

http://en.wikipedia.org/wiki/Malicious_software

User Avatar

Wiki User

15y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

11y ago

trojan horse

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Malicious software that hides within a legitimate program?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

A is malicious-logic program that hides within or looks like a legitimate program and ussually is triggered by a certain condition or action?

trojan horse your welcome :)


What type of malicious code is placed within a program to allow future access?

q


Pre-established settings within software program are called settings?

default setttings !


Which services does the CRM Project Management program provide?

The CRM Project Management software program provides project management, time sheets, and invoicing templates within the software for business use. All these services are within one application.


What is bank management?

A bank management system is a software program. This program allows the bank to manage all the interactions that happen within a bank.


What is bank management system?

A bank management system is a software program. This program allows the bank to manage all the interactions that happen within a bank.


Is there a way to see any program commands to make sure it is not harmful for your computer or does not belong to any malicious software kinds?

An up-to-date virus scanner will help protect against obviously malicious software, but don't be complacent. The best approach is to simply avoid running any commands or programs that you know nothing about. When advised to execute such a command, always do some research on the command first. The program may not be malicious but running a program you know nothing about can easily cause unintentional problems if not used properly. For instance, the DEL command can delete a specific file but if I told you to execute DEL /Y "*.*" that would delete all the files within the current folder without prompting. Unless you're familiar with the DEL command, it's not entirely obvious what it does. While most command line utilities provide help facilities (such as DEL /?), you cannot rely on this for all programs. Some will just ignore any invalid switches (such as /?) and execute anyway. So always research first. If a program is known as malicious it will quickly show up in a search of the internet, but keep in mind some programs masquerade as legitimate files. Check the file size, location, author, etc, to ensure you're actually dealing with the same file.


What is the main purpose of diagnostic software program and what does the diagnostic software determine?

Diagnostic software locates problems within the software, hardware, or any kind of combination thereof within a system, or network of systems. It provides users the needed assistance in isolating the problem, normally within the primary operating system of the computer(Linux, Windows, etc.). Once a problem is isolated with diagnostic software, it can be resolved.


Searching the Internet for LLC Tax Software?

There are often many instances where LLC tax software might be used. This type of software program is specifically designed with LLC corporations in mind. Since these companies use specialized tax forms, it is important that any software package designed for them have these forms within the program for quick printing.


Why are computer viruses called Trojan horses?

Actually they aren't. Computer viruses and Trojan horses are two different types of malware, i.e., malicious software.The type known as "Trojan horses" are named after the horse which, according to legend, was given as a "gift" by the Greeks, to the Trojans - their enemies. Just like the horse in the legend, the malware called "Trojan horses" also have a malicious intention. For more information about the legend, check the Wikipedia article on "Trojan horse".


What is a 'stinger download' used for?

The software program Stinger is used to remove specific viruses. The program is not meant to be used as full anti-virus protection. Stinger is a software used by administrators when trying to remove a specific virus within an infected system.


What does a Trojan horse attack?

A Trojan Horse program is designed to masquerade as a legit program in order to trick a user into downloading and running it. Most of the time, the Trojan Horse will provide the desired program, such as a game or music file, so as to avoid suspicion, but it runs malicious processes in the background. A Trojan Horse can do a number of things. Some come with a built-in keylogger so it can record keystrokes that allows a hacker to steal usernames and passwords. Others usually open a backdoor on the computer so it can download more malware off of the Internet.