answersLogoWhite

0

Access to your saved passwords, access to your file, see you, hear you, can break your PC, remotly control your PC

User Avatar

R-rules-man

Lvl 5
4y ago

What else can I help you with?

Related Questions

What does a Trojan horse virus do to the computer?

It can # make the computer slow # cause popup # steal passwords # cause errors


What is c5zedo?

A trojan horse (a computer virus).


How does a Trojan Horse virus get into a computer?

theres a computer chip


What Trojan does?

a trojan is a horse or computer virus that looks like a good thing but is not. a trojan is just and old horse.


What is a Trojan horse virus for your computer?

A virus that hides in a file that, when you run it, infects your computer.


What problems could a Trojan virus cause?

A trojan horse virus could cause you to lose sensitive information on your computer, or allow your computer to be controlled remotely by the attacker. It is recommended to always have an anti-virus and anti-malware program installed on your computer to avoid complications from spyware, malware, and viruses.


What computer virus attaches itself to another computer program?

Attach to emails files programmes etc


What are the types of Trojan horse virus?

There aren't types of Trojan Horse virus. A Trojan Horse is a type of virus.


What are the species of computer viruses?

The types of computer viruses are the virus, the worm and the Trojan horse.


What does a Trojan horse virus do?

A "trojan horse" is not a virus; it's a type of malware that may be spread like a virus. It hides within other programs, or pretends to be a trusted program, but it is really malicious software. Like the Trojan Horse in the Iliad, it secretly does damage once you mistakenly let it into your computer system. It can be used to steal information from the computer.


What is the Trojan horse for in computer terminology?

The trajan horse is used to allow the virus to evade detection and enter the computer.


Can Trojan horse virus attack the computer system without network?

It depends if the trojan horse was inside before networking was disabled.