answersLogoWhite

0


Best Answer

A Trojan Horse.

User Avatar

Wiki User

13y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

11y ago

trojan horse

This answer is:
User Avatar

User Avatar

Wiki User

12y ago

The Trojan horse

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What type of malware substitutes itself for a legitimate program?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Does not need a host program to work it substitutes itself for a legitimate program?

Trojan horse


Which type of malware substitutes itself for a legitmate program?

Security tool does. that's a good one.


What do i do when my bitdefender won't allow me to scan for malware?

Do you mean scan for malware with the program malwarebytes? That program is blocked by bitdefender. If you can't scan with the bitdefender program itself. Then contact them for technical support. They are available 24/7!


What virus disguises itself as a legitimate program to prevent detection?

Encrypted


Is Python a legitimate program?

Yes, it is a legitimate program, but is that what you were really asking? Are you talking about the language discussed at python.org? If you are wondering if the language itself is legitimate, it is. Simply, it is an interpreted language implemented directly in C.


What is the difference between malware and virus?

Malware is any software (program) designed to cause problems. A virus is a type of malware that attaches itself to other programs and sends itself to others. Other types of malware include worms, which are like viruses, but they run without attaching to another program, and trojans, which are downloaded by the user with the promise of doing something useful.


Which type of malware can copy itself over a network without involving a host program?

Worms.


What is the name of the virus that appers to be a legitimate program?

Do you mean the actual name of a virus or the classification of it? Well, for the latter, a virus that conceals itself or appears to be a legitimate program is called a Trojan.


Can malware duplicate itself?

Some malware can duplicate itself. Self-replicating malware which does so as a propagation mechanism is called a Worm.


Define and explain the difference between virus worms logic bombs and trogen horses?

Virus=A program that replicates by attaching itself to other programs. The infected program must be executed for a virus to run. Most of the time a system file or a program that you use occasionally.Logic Bomb=Dormant code added to software and triggered at a predetermined time or by a predetermined event.Trojan Horse=Does not need a host program to work; rather, it substitutes itself for a legit program. Likely to introduce one or more Viruses into your system. Sometimes called downloaders.Worm=Program that copies itself throughout a network or the internet without a host program. Creates problems by overloading the network as it replicates. Damaging just by their presence. Overloads memory or hard drive space by replicating repeatedly.


Is the ilivid download manager virus free?

Ilivid is not virus free and the program itself is full of malware... The program was made specifically to steal personal details and hijack people's computers.


Is Resource Hacker a computer virus?

No. Resource Hacker is a legitimate program that allows you to modify the "resources" of a program or library. Irresponsible use of it can corrupt important files, but it is not in itself harmful.