answersLogoWhite

0

Malicious code is any code designed to have an effect that is unintended by the receiver.

Viruses, Spyware and Malware are three examples.

Virus: Any code designed with the intent to damage files or disrupt hardware on a computer and to pass itself to other computers with the same intent.

Spyware: Code designed to track your usage on the internet and to deliver that information to outside marketing computers and advertise services to you.

Malware: Code designed to steal personal information such as usernames, passwords, bank account info, credit card numbers and report that information to people who may use your financial information to steal from you.

Other types may be called trojans, backdoors, worms, spyware, adware, or bloatware.

User Avatar

Jesse Barrows

Lvl 10
3y ago

What else can I help you with?

Related Questions

Is an example of malicious code?

Some examples of malicious code would be Computer Viruses, logic bombs, spyware, and adware.


Are skipjacks an example of malicious code?

No. Skipjacks are a kind of tuna.


What is an example of malicious code?

One example of malicious code is a computer virus that is designed to replicate itself and spread to other computers, causing damage to the system by corrupting files or stealing sensitive information.


Are Trojan horse and worms a malicious code?

is a worm a malicious code


Are worms a malicious code?

Yes.


Are Trojan horses honey pots cookies and skipjacks examples of a malicious code?

A Trojan Horse can carry malicious code in it. Not all Trojans have malicious code


ActiveX is best defined as?

Malicious code


What feature in amd processers provides a level of malicious code protection?

Answering "What feature in amd processers provides a level of malicious code protection?"


Which one is not a malicious code viruses Trojan horses worms cookies?

Cookies are not malicious code. They are just text files that save data for the sites you use. While cookies can be used maliciously, they are not malicious in and of themselves.


Are trojans horses malicious code?

YES! stay away from them...


How do you program a compressed file to extract to a certain location on any computer its downloaded to?

This sounds very much like malicious code. WikiAnswers does not provide information about writing malicious code.


What file extensions is most likely to contain a malicious code?

.bat