answersLogoWhite

0

Trojan horses, worms, and malicious scripts are spread several ways. The most common ways to acquire these are through questionable websites, social media, and in e-mails.

User Avatar

Emilia Bartell

Lvl 10
3y ago

What else can I help you with?

Related Questions

How are Trojan horses worms and malicious scripts spread?

Trojan horses, worms, and malicious scripts are spread several ways. The most common ways to acquire these are through questionable websites, social media, and in e-mails.


Do Trojan horses carry viruses or worms?

Trojan horses can carry viruses. Trojan horses disguise themselves to e something they are not. Trojans can be spread via email.


Do trojans mutate?

Not exactly. Some Trojan horses modify them selves slightly when they spread (EG by modify their name) but not enough to count as a mutation.


What is a coumputer virus?

A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously used, to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability.Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by other computers.As stated above, the term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, even those that do not have the ability to replicate themselves. Malware includes computer viruses, computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious or unwanted software, including true viruses. Viruses are sometimes confused with worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless but hides malicious functions. Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to themselves. Some viruses do nothing beyond reproducing themselves.


How does an Trojan horse virus spread?

will i did not scan my PC before i backed up my computer then after it finish backing up i scanned my PC. Norton internet security 2011 found Trojan virus so it deleted. Then next day i scanned my back up drive it found the same virus that infected my PC so that one way Trojan can spread.


Example of malicious code?

A simple virus can do basic things. For instance a worm, it finds wholes in networks, and can spread to other computers from one computer. Another example is, say there is a computer room at a school. And this computer room has lets say 20 computers all connected in a network to share files through a server computer. If one computer gets a worm, depending on the worm, it could spread through a number of the computers through the network. Worm: A type of virus that spreads through networks. Virus: Something that infects that one computer. Keylogger: Tracks whatever you type.


What does a Trojan horse virus do?

A "trojan horse" is not a virus; it's a type of malware that may be spread like a virus. It hides within other programs, or pretends to be a trusted program, but it is really malicious software. Like the Trojan Horse in the Iliad, it secretly does damage once you mistakenly let it into your computer system. It can be used to steal information from the computer.


What is the most common way to get a virus?

1. E-mail attachment. 2. Lack of firewall on an insecure network. 3. Malicious Web pages. 4. Co-installed with other legitimate but contaminated software. 5. Sometimes products like digital picture frames, MP3 players, flash drives, etc., are pre-infected at point of manufacture.


Does a worm on your computer require user interaction?

No. Worms are either spread via networks or through a Trojan. If the worm is spread through a Trojan, the installation program will usually contain an execution command to start the worm automatically. Worms that spread via networks have already been executed.


What a computer virus is and how is adversely affects the proper working of the system?

ImproveA computer virus is a computer program that can replicate itself[1] and spread from one computer to another. The term "virus" is also commonly, but erroneously used, to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability.Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by other computers.[2][3]As stated above, the term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, even those that do not have the ability to replicate themselves. Malware includes computer viruses, computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious or unwanted software, including true viruses. Viruses are sometimes confused with worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless but hides malicious functions. Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to themselves. Some viruses do nothing beyond reproducing themselves.


Never Accept a Trojan Horse?

The original Trojan horse was sent as a gift and when opened, revealed hundreds of armed soldiers who wreaked havoc. Today’s Trojan horses are computer malware that appear to be useful software, but can result in stolen personal and financial information. Many Trojan horses find personal information such as social security numbers, passwords, PIN numbers and bank account information. Although commonly spread through email attachments, it can also be downloaded from the Internet, received in a P2P file transfer, or transferred while executing an Internet-based program. It can also be attached to web browsers or email programs with security flaws. The term “Trojan horse virus” is a misnomer. It is not a virus. Viruses, by their very definition, replicate themselves and attach to legitimate files and programs. A Trojan horse does not replicate or infect other files. It doesn’t need to be “cleaned” from the computer’s files and programs; they aren’t affected. Instead it must be removed in its entirety. It should be noted, however, that it can persuade others to open or install it, thereby acting as a virus with the help of computer users. Trojan Horses often have less malicious, but still unwanted goals. They put advertising on the desktop or install a tool bar on the web browser without notice. Mostly they give access to unwanted parties. These parties can then use the computer remotely to spam others or format the hard drive, for example. Some Trojans perform key logging functions. This is how they obtain passwords and other normally secure information. They copy and record the keystrokes used to access the computer or various accounts on the Internet. In this way, they aren’t harmful by themselves, but only in interaction with a person using that information for malicious purposes. To avoid Trojan horses from gaining access to a computer, never open a file attached to an email from an unknown or untrustworthy sender. Make sure to have an updated firewall when using the Internet. Perform virus scans regularly, and always keep browsers and email programs updated. Although not a virus, virus programs still search for and eliminate most Trojan Horses.


How Trojan hourse virus was spread?

A Trojan Horse virus spreads through anyway possible, but the main way to get a Trojan horse is by downloading un-legitimate programs from the internet. What does a Black Trojan horse do: enters and exit's your computer undetected bringing in viruses from a unknown source.