is a worm a malicious code
Cookies are not malicious code. They are just text files that save data for the sites you use. While cookies can be used maliciously, they are not malicious in and of themselves.
A Trojan Horse can carry malicious code in it. Not all Trojans have malicious code
Trojan Horse
A Trojan horse is malware that appears to be something else. It may appear to be a harmless application, such as a game. Inside the software is code that is intended to do something unpleasant when it runs.
Yes.
Trojan horse, virus and worm not social engineering by prana kumar dubey, hcl cdc, agra
Yes, hence the name. The original Trojan horse appeared to be a gift and so, was not properly authenticated. Turned out to be full of Greeks. Code that appears to be benign or useful may actually carry malicious instructions.
restrictive code
The video clip was a Trojan horse and malicious code was downloaded onto his computer.
It's a Trojan horse Downloader. In the context of computer software, a Trojan horse is a malicious program that is disguised as legitimate software. The term is derived from the classical myth of the Trojan horse. They may look useful or interesting (or at the very least harmless) to an unsuspecting user, but are actually harmful when executed. Often the term is shortened to simply trojan, even though this turns the adjective into a noun, reversing the myth (Greeks were gaining malicious access, not Trojans). There are two common types of Trojan horses. One, is otherwise useful software that has been corrupted by a cracker inserting malicious code that executes while the program is used. Examples include various implementations of weather alerting programs, computer clock setting software, and peer to peer file sharing utilities. The other type is a standalone program that masquerades as something else, like a game or image file, in order to trick the user into some misdirected complicity that is needed to carry out the program's objectives. Trojan horse programs cannot operate autonomously, in contrast to some other types of malware, like viruses or worms. Just as the Greeks needed the Trojans to bring the horse inside for their plan to work, Trojan horse programs depend on actions by the intended victims. As such, if trojans replicate and even distribute themselves, each new victim must run the program/trojan. Therefore their virulence is of a different nature, depending on successful implementation of social engineering concepts rather than flaws in a computer system's security design or configuration.
1479
A "Trojan Horse", usually just referred to as a Trojan, is a file that , like the big wooden one did, contains something that you don't want to let in. Most trojans contain code that will allow hackers to access your computer... basically creating a back door into your system.