answersLogoWhite

0

They are forms of viruses.

User Avatar

Wiki User

9y ago

What else can I help you with?

Related Questions

What are the categories of Computer Virus?

maleware, spyware, trojan, sypware, worms, adware


Are Trojan horse and worms a malicious code?

is a worm a malicious code


Why you use the antivirus?

Antivirus software protects your PC from harmful virus. The word tells you what it does. It stops viruses to remove virus, worms, Trojan horse, malware, spyware and many other.. firewall is used to block hackers.


What is the most dangerous virus known to computers?

Trojan horse viruses and worms.


List at least 3 types of Malware?

The three types of Malware are:Infectious -- Consisting of Viruses and WormsConcealers -- Consisting of Trojan Horses and BackdoorsProfit Malware -- Consisting of Data mining and Dialers


How are computer virus computer worms and computer Trojan Horse different?

worm will not effect ur computer but ,tronjent will currept all the files & disable the task manager... >Worm viruses will duplicate your folder and end up eating your disk space and your disk memory. On tronjent or Trojan horse will make your executable files corrupt. Both are serious virus since they delete, destroy and duplicate files. In which Anti-viruses can't cope with this problem. The last option is to reformat your computer.


What is Super Anti-Spyware Free Edition?

'''It is a free, open-source antivirus program. It detects and removes trojans, worms, spyware, adware and other forms of malware. It also has an easy-to-use interface.'''


Is a Trojan horse a special virus?

A Trojan horse isn’t a virus, but it’s a type of malware. Unlike viruses, Trojans don’t replicate themselves. Instead, they disguise as legitimate software to trick users into installing them, giving attackers access to systems or data.


How does Trojan support spyware?

Trojan horses are designed to allow a hacker to target a remote computer system. Once a Trojan horse has been installed on a target computer system, it is possible for a hacker to access it remotely and perform various operations and it may do so without any user intervention at the remote end.


List the main types of computer viruses?

Trojan- A horse that infects the computer Worm- Makes computers stop Cakes- A type of infection that makes your computers stop from downloads Bug- Bugs that store and infect in your computer


Are computer viruses worms and Trojan horses and rootkits malware that act without the users knowledge?

computer viruses, worms, Trojan horses, and rootkits


What is NtmsDataoexe?

NTMSDATA.EXE is like viruses, spyware, adware, trojans, rootkits, worms, information stealers, keyloggers, bots, and other forms of malicious threats that may reside on your PC.

Trending Questions
What are some good ideas for computer desk plans? What is the difference between vista 32bit and 64bit? What companies manufacture microprocessors? In Excel Which options would you choose to change the number of copies that must be printed? What is AUT in software testing? What five media outlets where music critics publish their opinions? What user accounts management function can be performed on the PC settings page but not in the Manage Accounts window in Control Panel What functions can be performed both on the PC settings page and? What three storage techniques do DVDs use to achieve a greater storage capacity? Is formatting as important to a spreadsheet as it is to a word processing document? What is the purpose of an input form in Access? How long does it take to starve a mouse? Can r4sdhc software work on r4v2? How do you get the unread folder back in outlook? What is the frequency in Hertz of a signal that repeats 80000 times within one minute What is its period the length of one complete cycle? Read these meters to determine how much Isaac will pay if he pays 0.22674 per hundred cubic feet and 7.5 percent sales tax? Give an example of a classful subnet mask give an example of a classless subnet mask? If you need to change the address for an account after the setup is complete but before it is finalized what can you do? How many liters in a hectar liter? How do you turn on wireless on gateway sx2110g-uw24? What are the features of the best laptop and why?