answersLogoWhite

0

A trojan horse. A trojan horse is a program designed to disguise itself as a innocent program, and later find a backdoor into your computer, therefore letting the person on the other end take over your computer. Then, they can do anything they want. Steal your info, destroy Windows causing you to have to go buy another copy and reinstall, display pop-ups, and much, much more.

User Avatar

Wiki User

13y ago

What else can I help you with?

Related Questions

The most likely method a hacker would use to access a computer is .?

entering through the internet


What does DMA stand for and what does it do?

DMA, Direct Memory Access, is a method of transferring data from the computer's RAM to another part of the computer without processing it using the CPU.


Which method establishes an administrative connection for configuring the Linksys WRT300N wireless access point?

From a computer in the same IP subnet as the access point, enter the default IP address of the access point in a web browser.


What is the definition of a file based approach?

It is a method for storing and organizing computer files and the data they contain to make it easy to find an access.


How do you find out if a firearm is clean for purchase?

No standard method- as a private citizen, you cannot access the police computer database of stolen property.


What are the two characteristics of the controlled media access method?

It is known as a deterministic access method.


What is deterministic access method?

When using the controlled access method, network devices take turns, in sequence, to access the medium.


What has the author Bryan Douglas Knysh written?

Bryan Douglas Knysh has written: 'An alternative computer access method for physically disabled persons'


Full form for HSAM?

Hierarchical Sequential Access Method-is a method to use sequential access of database.


What is meant by private visibilty of a method?

It means that the method is visible from only within the current method. Also, any class that wants to use or invoke the private method has to create an object of the class in which the method is created in order to access/invoke it. The private access modifier is the most restrictive of the four java access modifiers. The total opposite of private is public which gives access to everyone.


What is the random access method?

Is one of the three types of Access Protocols. In this method any station has the right to access the medium with out being controlled by any station.


What is sequential address method?

Sequential address method is a memory addressing technique where data is stored in adjacent memory locations, allowing for easy access to the next or previous data element by incrementing or decrementing the memory address by a fixed amount. This method is commonly used in computer programming to efficiently access data structures like arrays or linked lists sequentially.