answersLogoWhite

0

Not necessarily, they are mostly used by websites that you frequent, so that the site recognizes you as a user when you return there.

It is possible for them to be used for a malicious purpose by some people; they can be used to track a person's browsing habits.
Cookies are a important part of the internet they are needed in order to make websites look cool. Cookies can be malicious and can track your web browsing but under most circumstances there good things.

User Avatar

Wiki User

13y ago

What else can I help you with?

Continue Learning about Computer Science

Are Trojan horses honey pots cookies and skipjacks examples of a malicious code?

A Trojan Horse can carry malicious code in it. Not all Trojans have malicious code


List the main types of computer viruses?

Trojan- A horse that infects the computer Worm- Makes computers stop Cakes- A type of infection that makes your computers stop from downloads Bug- Bugs that store and infect in your computer


How does Trojan support spyware?

It sounds like there may be some confusion in your question. Trojans and spyware are two types of malicious software, but they work differently and serve specific purposes. Here’s a breakdown of each and their relationship: Trojans: A Trojan horse, or simply a Trojan, is a type of malware that masquerades as a legitimate software file to trick users into installing it and, once installed, can perform a variety of malicious actions. Trojans often serve as a backdoor into an infected system, allowing an attacker to access or monitor it without permission. They generally do not behave like bugs or worms. Spyware: Spyware is a type of malware designed to harvest information from a user’s device without their knowledge. This information may include personal information, browsing, or login credentials. Spyware often monitors user activity and can transmit this data to outsiders.


What are fun or facts about horses?

1. Horses can not throw up ( srry if that is gross.) 2. Horses can't buck with their heads up high 3. Horses can be thought to rear on command and other exiting tricks. 4. A horse has four gaits and the Tennessee walking horse has 5 gaits. 5.i cant think of any at the time srry


What are some email ID's that reflect a love for horses without sounding too childish?

Try someting like Diligo Ferrum. It's Latin for Loves Horses. Horsesforever, imahorse, horselover, (Your first initial)horse what about wildmustang,or wildrider, or horsinaround, or ihearthorses, or horsehotty. just a question is this for a guy or girl.i guessnit doesn't matter.

Related Questions

Which one is not a malicious code viruses Trojan horses worms cookies?

Cookies are not malicious code. They are just text files that save data for the sites you use. While cookies can be used maliciously, they are not malicious in and of themselves.


Are Trojan horses honey pots cookies and skipjacks examples of a malicious code?

A Trojan Horse can carry malicious code in it. Not all Trojans have malicious code


What is a mailicious code a.Skipjacks b. Trojan horses c. Honey Pots d. Cookies?

b. Trojan Horses


What is a generic8 Trojan horse?

Generic8 Trojan horse is a virus that computers can get. Trojan horses are malicious programs and can be removed with antivirus software.


What is backdoor Trojan horses?

A backdoor Trojan horse is a malicious program that allows the hacker to view everything on your computer.


Which are programs that pretend to be a useful program but do something malicious on your computer?

Trojan Horses


How are Trojan horses worms and malicious scripts spread?

Trojan horses, worms, and malicious scripts are spread several ways. The most common ways to acquire these are through questionable websites, social media, and in e-mails.


How Trojan horses worm and malicious script spread?

Trojan horses, worms, and malicious scripts are spread several ways. The most common ways to acquire these are through questionable websites, social media, and in e-mails.


Worms and Trojan horses are examples of .?

malware


Why are computer viruses called Trojan horses?

Actually they aren't. Computer viruses and Trojan horses are two different types of malware, i.e., malicious software.The type known as "Trojan horses" are named after the horse which, according to legend, was given as a "gift" by the Greeks, to the Trojans - their enemies. Just like the horse in the legend, the malware called "Trojan horses" also have a malicious intention. For more information about the legend, check the Wikipedia article on "Trojan horse".


What are worms trojan horses and root kit examples of?

Computer viruses


Do Trojan horses carry viruses or worms?

Trojan horses can carry viruses. Trojan horses disguise themselves to e something they are not. Trojans can be spread via email.