answersLogoWhite

0


Best Answer

Trojan Horse

User Avatar

Wiki User

12y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What type of application do users inadvertently download and run which can open a connection to a computer on the Internet enabling an attacker on the outside to run programs or store data on system?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Why are DDoS more difficult to defend?

If an attacker has your IP, it really is not possible to defend against one unless you were to purchase an extremely expensive internet connection. The average household connection has no defense, but if you were to purchase a business class connection, you would have some protection from your ISP.


What is packet spoofing?

In this technique, an attacker sends packets with an incorrect source address. when this happens the receiver i.e the party who receives the packets containg a false source address would inadvertently send replies back to the forged address and not to the attacker


Who started DOS attacks?

Intruders ,attacker,or some time user who want to destroy server and its application. After DoS attack server and their application are not able to respond.


What is the Tamil meaning for Attacker?

The Tamil word for "Attacker" is தீவாதி.


What is correct a horse outruns an attacker or outrun an attacker?

The correct way would be 'a horse outruns an attacker', singlular horse, present tense.


How does the wasp protect itself from its enemies?

With it's stinger, it strikes the attacker and releases venom into the attacker. The stinger is left in the attacker and soon, it dies.


What stings an attacker with paralyzing poison?

A Scorpion stings an attacker with paralyzing poison


What story does the attacker tell Santiago?

In the Alchemist What story does the attacker tell Santiago


What is a man-in-the-middle attack in regards to computers?

The man-in-the-middle attack is cryptography and computer security is a form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker.


What are the characteristics on spoofing as a computer threat?

Spoofing is when an attacker pretends to be someone else in order gain access to restricted resources or steal information. This type of attack can take a variety of different forms; for instance, an attacker can impersonate the Internet Protocol (IP) address of a legitimate user in order to get into their accounts. Also, an attacker may send fraudulent emails and set up fake websites in order to capture users' login names, passwords, and account information. Faking an email or website is sometimes called a phishing attack. Another type of spoofing involves setting up a fake wireless access point and tricking victims into connecting to them through the illegitimate connection.


In runescape how do you get a fighter hat?

You must play barbarian assault and get around 275 points in each of the four roles. Healer, Attacker, Defender, and collector. Defender is best done with fast Internet. Everything else is fine with not so fast Internet


Does the offside rule give the benefit of the doubt to the attacker or defender?

should be the attacker but usually the defender