answersLogoWhite

0

Are trojans horses malicious code

User Avatar

Anonymous

16y ago
Updated: 8/17/2019

YES! stay away from them...

User Avatar

Wiki User

16y ago

What else can I help you with?

Related Questions

Are Trojan horses honey pots cookies and skipjacks examples of a malicious code?

A Trojan Horse can carry malicious code in it. Not all Trojans have malicious code


Which one is not a malicious code viruses Trojan horses worms cookies?

Cookies are not malicious code. They are just text files that save data for the sites you use. While cookies can be used maliciously, they are not malicious in and of themselves.


What protocols should be blocked to prevent trojans and malicious traffic?

ICMP


Are Trojan horse and worms a malicious code?

is a worm a malicious code


A file with which of the following file extensions is most likely to contain malicious code?

A file with the extension ".exe" is most likely to contain malicious code. This extension indicates an executable file, which can run programs on your computer. Malicious actors often use executable files to deliver harmful software such as viruses, trojans, or ransomware. It is important to exercise caution when opening files with the ".exe" extension, especially if they are from unknown or untrusted sources.


Why are computer viruses called Trojan horses?

Actually they aren't. Computer viruses and Trojan horses are two different types of malware, i.e., malicious software.The type known as "Trojan horses" are named after the horse which, according to legend, was given as a "gift" by the Greeks, to the Trojans - their enemies. Just like the horse in the legend, the malware called "Trojan horses" also have a malicious intention. For more information about the legend, check the Wikipedia article on "Trojan horse".


What should one consider To prevent damage from malicious mobile code?

Malicious mobile code, or various viruses, worms, trojans, and other Internet predators, is a very real danger on the Internet. In order to protect yourself from such danger, be wary when responding to emails. Do not accept emails from unknown senders, and make sure your email provider has an up-to-date spam filter.


Is an example of malicious code?

Some examples of malicious code would be Computer Viruses, logic bombs, spyware, and adware.


Are worms a malicious code?

Yes.


Which are programs that pretend to be a useful program but do something malicious on your computer?

Trojan Horses


ActiveX is best defined as?

Malicious code


How are Trojan horses worms and malicious scripts spread?

Trojan horses, worms, and malicious scripts are spread several ways. The most common ways to acquire these are through questionable websites, social media, and in e-mails.