answersLogoWhite

0


Best Answer

is a worm a malicious code

User Avatar

Wiki User

8y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Are Trojan horse and worms a malicious code?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Which one is not a malicious code viruses Trojan horses worms cookies?

Cookies are not malicious code. They are just text files that save data for the sites you use. While cookies can be used maliciously, they are not malicious in and of themselves.


Are Trojan horses honey pots cookies and skipjacks examples of a malicious code?

A Trojan Horse can carry malicious code in it. Not all Trojans have malicious code


A user opens an email attachment that triggers malicious code to delete system files?

Trojan Horse


Why do people make Trojan horse software?

A Trojan horse is malware that appears to be something else. It may appear to be a harmless application, such as a game. Inside the software is code that is intended to do something unpleasant when it runs.


Are worms a malicious code?

Yes.


Show all the attacks based on malicious code?

Trojan horse, virus and worm not social engineering by prana kumar dubey, hcl cdc, agra


Can Trojan horse bypass normal authentication process?

Yes, hence the name. The original Trojan horse appeared to be a gift and so, was not properly authenticated. Turned out to be full of Greeks. Code that appears to be benign or useful may actually carry malicious instructions.


What is ActiveX mobile code restricted code Trojan horse?

restrictive code


What can be wrong if at work after you view a funny video clip your friend sent you on your personal email account you notice that your workstation is slower than normal?

The video clip was a Trojan horse and malicious code was downloaded onto his computer.


What is 1stbar?

It's a Trojan horse Downloader. In the context of computer software, a Trojan horse is a malicious program that is disguised as legitimate software. The term is derived from the classical myth of the Trojan horse. They may look useful or interesting (or at the very least harmless) to an unsuspecting user, but are actually harmful when executed. Often the term is shortened to simply trojan, even though this turns the adjective into a noun, reversing the myth (Greeks were gaining malicious access, not Trojans). There are two common types of Trojan horses. One, is otherwise useful software that has been corrupted by a cracker inserting malicious code that executes while the program is used. Examples include various implementations of weather alerting programs, computer clock setting software, and peer to peer file sharing utilities. The other type is a standalone program that masquerades as something else, like a game or image file, in order to trick the user into some misdirected complicity that is needed to carry out the program's objectives. Trojan horse programs cannot operate autonomously, in contrast to some other types of malware, like viruses or worms. Just as the Greeks needed the Trojans to bring the horse inside for their plan to work, Trojan horse programs depend on actions by the intended victims. As such, if trojans replicate and even distribute themselves, each new victim must run the program/trojan. Therefore their virulence is of a different nature, depending on successful implementation of social engineering concepts rather than flaws in a computer system's security design or configuration.


What was the code put in the evidence locker on ncis episode Trojan horse?

1479


What is Trojan Horse 32?

A "Trojan Horse", usually just referred to as a Trojan, is a file that , like the big wooden one did, contains something that you don't want to let in. Most trojans contain code that will allow hackers to access your computer... basically creating a back door into your system.