Want this question answered?
A Trojan Horse can carry malicious code in it. Not all Trojans have malicious code
q
Malicious code is any code designed to have an effect that is unintended by the receiver. Viruses, Spyware and Malware are three examples. Virus: Any code designed with the intent to damage files or disrupt hardware on a computer and to pass itself to other computers with the same intent. Spyware: Code designed to track your usage on the internet and to deliver that information to outside marketing computers and advertise services to you. Malware: Code designed to steal personal information such as usernames, passwords, bank account info, credit card numbers and report that information to people who may use your financial information to steal from you. Other types may be called trojans, backdoors, worms, spyware, adware, or bloatware.
No honeypot (in a nutshell) is used to lure and trap hackers from stealing information on the system
Botnets are networks of infected computers that can be controlled by a master computer. Such compromised computers are infected due a malicious code. The malicious code or malware is sent to computers through various means like email attachments, spam emails, video downloads, music downloads etc. Computers that are vulnerable are the first ones to be targeted.
Files with the .bat extension are most likely to contain malicious code.
he should scan all media prior to accessing any files they contain
.bat
.bat
Cookies are not malicious code. They are just text files that save data for the sites you use. While cookies can be used maliciously, they are not malicious in and of themselves.
backup important files
which file extension is mos likely to contain malicious codes, .doc,. bat, pdf,.jpg?
'.java' files contain java source code. One can access these files on windows by using 'notepad'.
Trojan Horse
Those files have the extension .java
is a worm a malicious code
.jar files contain byte-code compiled to run on the Java Virtual Machine.