answersLogoWhite

0

I'm not an expert on the subject but this link might shed some light on the topic.

http://en.wikipedia.org/wiki/Malicious_software

User Avatar

Wiki User

17y ago

What else can I help you with?

Related Questions

A is malicious-logic program that hides within or looks like a legitimate program and ussually is triggered by a certain condition or action?

trojan horse your welcome :)


What type of malicious code is placed within a program to allow future access?

q


What is malicious add-on?

A malicious add-on is a software extension or plugin that is designed to harm a user's system, compromise security, or exploit personal data. Often disguised as legitimate applications, these add-ons can track user activity, inject advertisements, or even install additional malware. They typically operate within web browsers or software platforms, manipulating functionality for malicious purposes. Users should exercise caution when installing add-ons and ensure they come from reputable sources.


What is binary infection?

Binary infection refers to a type of malicious software attack where a virus or malware embeds itself within executable files, effectively altering the original binary code. This allows the malware to execute whenever the infected program is run, potentially spreading to other systems. It poses a significant risk as it can bypass security measures that scan for known threats, making it harder to detect and remove. The term highlights the dual nature of affected files, as they contain both legitimate and malicious code.


Pre-established settings within software program are called settings?

default setttings !


Which services does the CRM Project Management program provide?

The CRM Project Management software program provides project management, time sheets, and invoicing templates within the software for business use. All these services are within one application.


What is an undetectable program that hides within another program for the purpose of altering or destroying data?

An undetectable program that hides within another program to alter or destroy data is commonly known as a "trojan horse." Trojans disguise themselves as legitimate software, tricking users into installing them. Once activated, they can manipulate, corrupt, or delete data without the user's knowledge, posing significant security risks. Unlike viruses, trojans do not replicate themselves but rely on user interaction for activation.


What is bank management?

A bank management system is a software program. This program allows the bank to manage all the interactions that happen within a bank.


What is bank management system?

A bank management system is a software program. This program allows the bank to manage all the interactions that happen within a bank.


Is there a way to see any program commands to make sure it is not harmful for your computer or does not belong to any malicious software kinds?

An up-to-date virus scanner will help protect against obviously malicious software, but don't be complacent. The best approach is to simply avoid running any commands or programs that you know nothing about. When advised to execute such a command, always do some research on the command first. The program may not be malicious but running a program you know nothing about can easily cause unintentional problems if not used properly. For instance, the DEL command can delete a specific file but if I told you to execute DEL /Y "*.*" that would delete all the files within the current folder without prompting. Unless you're familiar with the DEL command, it's not entirely obvious what it does. While most command line utilities provide help facilities (such as DEL /?), you cannot rely on this for all programs. Some will just ignore any invalid switches (such as /?) and execute anyway. So always research first. If a program is known as malicious it will quickly show up in a search of the internet, but keep in mind some programs masquerade as legitimate files. Check the file size, location, author, etc, to ensure you're actually dealing with the same file.


What is piggybacking virus?

A piggybacking virus, also known as a "payload virus," is a type of malware that attaches itself to legitimate software or files to spread without detection. This virus often relies on the unsuspecting user to execute the host program, thereby enabling the virus to infect the system. Once activated, it can perform harmful activities, such as data theft or system damage, while remaining hidden within the legitimate software. Piggybacking is a common technique used by cybercriminals to bypass security measures.


What does a malicious insider require in order to exploit an organization vulnerabilities?

A malicious insider requires access to sensitive information and systems, which typically involves legitimate credentials and permissions within the organization. They also need knowledge of the organization's vulnerabilities, including security weaknesses and operational processes, to effectively exploit them. Additionally, the insider may benefit from understanding the organization's culture and trust dynamics to avoid detection while executing their malicious activities.