answersLogoWhite

0


Best Answer

This can be known by many names. "Malware" is generally used to describe any software that damages your computer. A "Trojan horse" is a specific type of malware which poses as a useful application, but actually performs malicious acts once installed.

User Avatar

Wiki User

14y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

12y ago

Trojan Horse

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What computer program appears useful but is malicious?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Which are programs that pretend to be a useful program but do something malicious on your computer?

Trojan Horses


A computer program that appears to have a useful functionbut also has hidden and potentiall malicious functions that evade security machanismssometimes by exploiting legitimate authorisations of syste?

Trojan Horse


What is program that appears to be something useful or desirable but at the same time does something malicious in the background?

A Trojan Horse


Are Trojan horses honey pots cookies and skipjacks examples of a malicious code?

A Trojan Horse can carry malicious code in it. Not all Trojans have malicious code


A program that disguises itself as something useful but actually harms your system is called a?

It is a virus called Mal-ware (Malicious Software) and is programmed to destroy critical files on a computer, these viruses to be undetected will travel in a Trojan Horse that will transport viruses in and out of the computer system.


Why isn't creating viruses and malware illegal?

The same as that it isn't illegal to make or buy a hammer, but it is illegal to knock it on someones head. Creating viruses doesn't harm anyone and the person making it can make them for educational purposes only or the program can have legal and illegal purposes. A program that controls another person his computer can be useful, think of logmein where the user of the computer grants access to his computer. However the same type of program can be malicious used by criminals by controlling the computer without the person knowing it.


Why computers are prone to viruses?

Computers run applications and for applications to be useful they need access to important systems that maintain your computer, viruses abuse these permissions and inflict malicious actions on your computer


What makes adobe acrobat useful for teachers?

Adobe acrobat is a simple program useful for typing up documents quickly, in an understandable and not confusing layout. Transferring documents from computer to computer via flash drive is easier than using a program like Microsoft Word.


What is the name of the viruses that appears to be a legitimate program but when opened it can steal passwords or destroy data?

Trojans are pieces of malware that are downloaded by the user because they believe it is a useful program, but cause harm instead.


How is backward compatibility useful for computer users?

A new version of a program is said to be backward compatible if it can use files and data created with an older version of the same program.


What is the name of a virus that appears to be legitimate program?

A Trojan Horse. Trojan Horse programs disguise themselves as legitimate programs and then infect your computer when you download them unwittingly, expecting to get a cool new PC game or such. They run malicious processes in the backround without you knowing and generally open up a backdoor or trapdoor to the Internet to download more viruses on your computer without your permission. Usually you can find Trojans by looking on Task Manager. You may find names of programs you don't know or have weird names. Be careful when taskkilling programs, one may end up being useful.


What ways computer can be fooled on data intergrity?

Data Integrity is a quality control method that ensures that the information going into the computer program is useful to the computer program. Computer programs are written by humans. One reason that computer programs are written is that a human wants a large amount of data to be searched for relevant information. If the program is properly written it will detect information entered that is of little use to the program. Poorly written programs can be fooled by humans that want to enter football scores into a program processing weather information, but why would you want to fool the computer?