answersLogoWhite

0

Logic Bomb

They go off when certain conditions are met.

One example being a certain date or time.

User Avatar

Wiki User

14y ago

What else can I help you with?

Related Questions

What is a virus that is triggered when certain conditions are met?

A Logic Bomb


Are viruses that are triggered by the passage of time or on a certain date?

Logic bomb


What virus does not cause damage until a certain date?

it is a time-bomb virus


Is a logic bomb normally triggered by the passages of time or on a certain date?

False


Is a logic bomb normally triggered by the passage of time or on a certain date?

False


A logic bomb is normally triggered by the passage of time or on a certain date.?

False


What causes the reactivation of the virus?

It is believed that the reactivation is triggered when the immune system becomes weakened as a result of age, stress, fatigue , certain medications, chemotherapy, or diseases such as cancer or HIV.


How was the big bang triggered?

It is currently quite certain that a Big Bang DID occur. It is NOT known what triggered it.


Explain about computer viruses time bomb?

the virus is in effect at a certain time or date that up there and it projects multiple windows of desktop items, previous visited sites, and mostly hundreds of blank notepad windows the ram overloads and the computer blacks out (ram is fried buy new one)


Right Media virus deletion?

Right Media virus deletion can sometimes be accomplished by doing what is called a system recovery on the computer. It deletes any installations that occurred after a certain date. A person can set any date they would like to do a system restore because the computer time stamps everything.


How are the lysogenic and lytic cycles different?

causes Disease


What is the name for the action carried out by a virus when it is activated?

The action carried out by a virus when it is activated is typically referred to as executing or running. This involves the virus code being triggered and performing its intended functions, which could include replicating itself, corrupting files, or stealing data.

Trending Questions
Which method encapsulates standard PPP through a variety of media? How much does color catalog printing cost? What mouse operations would you use if you want to change the position of the pointer on the screen? Is a programmed formula that the originator of the data uses to encrypt the plain text and the recipient of the data uses to decrypt the cipher text? You are not able to open the folder how do you delete a virus? What is halfway between Apple Valley CA and Surprise AZ? You got a computer from a friend who needs it cleaned out it has bad viruses and screen blurs to where its hard to see anything yet your trying to clean out the whole hard drive how do you do it? How do you get a bar graph on Office Word 2007? Is it difficult to turn nook HD into Android tablet using win32image? Which backup site would require NO setup time at the occurrence of an emergency Which backup site would require NO setup time at the occurrence of an emergency Which backup site would require NO setup? How many different output devices are available for purchase? What is the latest in prosthetics? What is an NOS and what is it designed to do? How do you show deepfreeze icon on taskbar? What are high memory RFID chips? What are the responsibilities of an Information Technology Manager? Where can one find information on picture recovery? Is it really important to wear a static strap when working on a computer? 248 mb eguals how many gb? How is reengineering linked to information technology?