answersLogoWhite

0

Trojan horse, virus and worm not social engineering by prana kumar dubey, hcl cdc, agra

User Avatar

Wiki User

13y ago

What else can I help you with?

Related Questions

Are Trojan horse and worms a malicious code?

is a worm a malicious code


What is a method that a virus might use to inject itself into its target?

A virus can inject itself into its target by exploiting software vulnerabilities, using social engineering to trick users into running malicious code, or through email phishing attacks that trick users into opening malicious attachments or clicking on malicious links.


Is an example of malicious code?

Some examples of malicious code would be Computer Viruses, logic bombs, spyware, and adware.


Are worms a malicious code?

Yes.


Is an example of malicious code Trojan horses honey pots cookies skipjacks?

An example of malicious code is a Trojan horse. This type of malware disguises itself as legitimate software to trick users into installing it, allowing attackers to gain unauthorized access to systems and data. In contrast, honeypots are security resources set up to attract and analyze attacks, while cookies are benign data files used for tracking user preferences on websites. Skipjack is a cryptographic algorithm, not malicious code.


Are Trojan horses honey pots cookies and skipjacks examples of a malicious code?

A Trojan Horse can carry malicious code in it. Not all Trojans have malicious code


ActiveX is best defined as?

Malicious code


What feature in amd processers provides a level of malicious code protection?

Answering "What feature in amd processers provides a level of malicious code protection?"


Which one is not a malicious code viruses Trojan horses worms cookies?

Cookies are not malicious code. They are just text files that save data for the sites you use. While cookies can be used maliciously, they are not malicious in and of themselves.


Are trojans horses malicious code?

YES! stay away from them...


Are skipjacks an example of malicious code?

No. Skipjacks are a kind of tuna.


How do you program a compressed file to extract to a certain location on any computer its downloaded to?

This sounds very much like malicious code. WikiAnswers does not provide information about writing malicious code.