answersLogoWhite

0

I think the KeyLogger virus.

User Avatar

R-rules-man

Lvl 5
4y ago

What else can I help you with?

Related Questions

History of Trojan horse?

The Trojan horse was first proposed towards the end of the Trojan war, it is unclear specifically when this was. First proposed by Odysseus to gain entry to the city of troy under the ruse of it being a statue to their patron god of the sea posiden. The Trojan horse conatined greek soldiers, which, once inside the city set in motion the destruction of the city of troy.


What is the name of the virus that appears to be a legitimate program but when opened it can steal passwords or destroy data?

The name it's given is called a Trojan virus taken from the Trojan war with worriors inside a giant wooden horse that was a given as a gift.


What is the legend of Trojan Horse?

It was a large horse made by the Trojan's of wood with a door concealed under the belly, it was offered as a gift to gain entrance into a fortrace, once the fortrace doors were opened and the large horse was brought inside, the soldier's inside waited til all was quit and gained access to fight inside the fortress. So a Trojan Horse is a term used for a hidden virus, It is concealed in a program and then gains access through disguise into your computer....


How did the greek soldiers penetrate the Trojan walls?

The Greek soldiers penetrated the Trojan walls through the cunning use of the Trojan Horse, a large wooden structure that housed a select group of soldiers. The Greeks left the horse at the gates of Troy as a deceptive gift, feigning their departure. The Trojans, believing they had won, brought the horse into the city. Under cover of night, the hidden soldiers emerged, opened the gates for the rest of the Greek army, and seized control of Troy.


What is the climax of the story of Trojan Horse?

The climax of the Trojan Horse story occurs when the Greek soldiers hidden inside the massive wooden horse are finally revealed after the Trojans bring it into their city. Believing they have won the war and that the Greeks have abandoned their siege, the Trojans celebrate and feast, leaving the horse unguarded. Under the cover of night, the Greek soldiers emerge, opening the gates for the rest of the Greek army to enter, leading to the fall of Troy. This pivotal moment marks the turning point in the war, sealing the fate of the Trojan city.


How are viruses and diseases different?

They are not mutually exclusive terms. Virus is a subgroup under diseases.


Are you a victim of a Trojan horse?

Trojan Horse is a type of malware which involves embedding a computer virus software program onto the customer's computer or smart phone .Trojans function on the mechanism of attaching themselves into the keyboard driver and they record keystrokes. As soon as a Trojan detects that the customer has opened an online banking website, it captures the login name and password, and transmits the same to the criminal. This is a punishable offence under Section 43 of the Indian Information Technology Act, 2000 with a penalty up to 10 million rupees.


What is the different from a pony and a horse?

A horse is over 14.3hh and a pony is under 14.2hh [ hh= hand high] [ there measured in hands] [1 hand is about and adults hand]


What is it called when a horse is under 14hh?

A Horse under 14.2HH is a ponie. Ahorse over that height is a horse.


A horse under 14.2 hh is caled a what?

# A horse 14.3h and under is a pony anything over is a horse!


A horse under the height of 14.2hh is called a what?

a PONY is what they call a horse which is under 14.2hh a HORSE is what they call a horse which is over 14.2hh


How do your heal your horse if its vaccinated against the flu on howrse?

theres different medicines at the shop under healthcare...