answersLogoWhite

0

What else can I help you with?

Continue Learning about Computer Science

Are Trojan horses honey pots cookies and skipjacks examples of a malicious code?

A Trojan Horse can carry malicious code in it. Not all Trojans have malicious code


What type of malicious code is placed within a program to allow future access?

q


What are example of malicious code?

Malicious code is any code designed to have an effect that is unintended by the receiver. Viruses, Spyware and Malware are three examples. Virus: Any code designed with the intent to damage files or disrupt hardware on a computer and to pass itself to other computers with the same intent. Spyware: Code designed to track your usage on the internet and to deliver that information to outside marketing computers and advertise services to you. Malware: Code designed to steal personal information such as usernames, passwords, bank account info, credit card numbers and report that information to people who may use your financial information to steal from you. Other types may be called trojans, backdoors, worms, spyware, adware, or bloatware.


Is honeypot a malicious code?

No honeypot (in a nutshell) is used to lure and trap hackers from stealing information on the system


What is a botnets?

Botnets are networks of infected computers that can be controlled by a master computer. Such compromised computers are infected due a malicious code. The malicious code or malware is sent to computers through various means like email attachments, spam emails, video downloads, music downloads etc. Computers that are vulnerable are the first ones to be targeted.

Related Questions

A file with which of the following file extensions is most likely to contain malicious code?

A file with the extension ".exe" is most likely to contain malicious code. This extension indicates an executable file, which can run programs on your computer. Malicious actors often use executable files to deliver harmful software such as viruses, trojans, or ransomware. It is important to exercise caution when opening files with the ".exe" extension, especially if they are from unknown or untrusted sources.


What can frank do to avoid malicious code to his home computer?

he should scan all media prior to accessing any files they contain


What file extensions is most likely to contain a malicious code?

.bat


What file extensions is most likely to contain malicious code?

.bat


Which one is not a malicious code viruses Trojan horses worms cookies?

Cookies are not malicious code. They are just text files that save data for the sites you use. While cookies can be used maliciously, they are not malicious in and of themselves.


What are the common ways of spreading malicious code according to the usda?

backup important files


What is a file extensions mostly likely to contain malicious code?

which file extension is mos likely to contain malicious codes, .doc,. bat, pdf,.jpg?


What kind of file contain java source code?

'.java' files contain java source code. One can access these files on windows by using 'notepad'.


A user opens an email attachment that triggers malicious code to delete system files?

Trojan Horse


What kind of files contain java souce code?

Those files have the extension .java


What is an example of malicious code?

One example of malicious code is a computer virus that is designed to replicate itself and spread to other computers, causing damage to the system by corrupting files or stealing sensitive information.


Are Trojan horse and worms a malicious code?

is a worm a malicious code