answersLogoWhite

0

Different virus under Trojan horse viruses?

Updated: 5/21/2021
User Avatar

Wiki User

15y ago

Best Answer

I think the KeyLogger virus.

User Avatar

R-rules-man

Lvl 5
2y ago
This answer is:
User Avatar
User Avatar

Jedediah Rutherford

Lvl 1
2y ago
thx
User Avatar

Demetrius Parisian

Lvl 1
2y ago
Where did you get your answer
User Avatar

Minnie Crist

Lvl 1
2y ago
can you explain how you got that?

Add your answer:

Earn +20 pts
Q: Different virus under Trojan horse viruses?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

History of Trojan horse?

The Trojan horse was first proposed towards the end of the Trojan war, it is unclear specifically when this was. First proposed by Odysseus to gain entry to the city of troy under the ruse of it being a statue to their patron god of the sea posiden. The Trojan horse conatined greek soldiers, which, once inside the city set in motion the destruction of the city of troy.


What is the name of the virus that appears to be a legitimate program but when opened it can steal passwords or destroy data?

The name it's given is called a Trojan virus taken from the Trojan war with worriors inside a giant wooden horse that was a given as a gift.


What is the legend of Trojan Horse?

It was a large horse made by the Trojan's of wood with a door concealed under the belly, it was offered as a gift to gain entrance into a fortrace, once the fortrace doors were opened and the large horse was brought inside, the soldier's inside waited til all was quit and gained access to fight inside the fortress. So a Trojan Horse is a term used for a hidden virus, It is concealed in a program and then gains access through disguise into your computer....


How are viruses and diseases different?

They are not mutually exclusive terms. Virus is a subgroup under diseases.


Are you a victim of a Trojan horse?

Trojan Horse is a type of malware which involves embedding a computer virus software program onto the customer's computer or smart phone .Trojans function on the mechanism of attaching themselves into the keyboard driver and they record keystrokes. As soon as a Trojan detects that the customer has opened an online banking website, it captures the login name and password, and transmits the same to the criminal. This is a punishable offence under Section 43 of the Indian Information Technology Act, 2000 with a penalty up to 10 million rupees.


What is the different from a pony and a horse?

A horse is over 14.3hh and a pony is under 14.2hh [ hh= hand high] [ there measured in hands] [1 hand is about and adults hand]


How do your heal your horse if its vaccinated against the flu on howrse?

theres different medicines at the shop under healthcare...


What is it called when a horse is under 14hh?

A Horse under 14.2HH is a ponie. Ahorse over that height is a horse.


A horse under 14.2 hh is caled a what?

# A horse 14.3h and under is a pony anything over is a horse!


A horse under the height of 14.2hh is called a what?

a PONY is what they call a horse which is under 14.2hh a HORSE is what they call a horse which is over 14.2hh


How did the Greeks get inside troy?

According to Homerus' book The Iliad, by constructing a large wooden horse and hiding a goup of soldiers inside it. Then they sailed away, seemingly conceding the failure of their siege. The Trojans then dragged the horse inside Troy as a victory trophy. At night, the Greek soldiers crept out of the horse and opened the gate for their countrymen, who had sailed back under cover of the darkness.


Can you see bacteria with viruses under microscope?

Yes, bacteria can be seen under a light microscope as they are larger than viruses. However, viruses are much smaller and cannot be seen with a light microscope. Specialized electron microscopes are required to visualize viruses.