answersLogoWhite

0

It may show Trojan horse characteristics like pretending to be legitimate software and once installed download spyware and infect the computer. Or steal passwords

User Avatar

Wiki User

13y ago

What else can I help you with?

Related Questions

Why are computer viruses called Trojan horses?

Actually they aren't. Computer viruses and Trojan horses are two different types of malware, i.e., malicious software.The type known as "Trojan horses" are named after the horse which, according to legend, was given as a "gift" by the Greeks, to the Trojans - their enemies. Just like the horse in the legend, the malware called "Trojan horses" also have a malicious intention. For more information about the legend, check the Wikipedia article on "Trojan horse".


What are the five known computer viruses?

1.Trojan 2.Worm 3.File infector 4.Macro 5.Boot Sector viruses


What is the purpose of a rootkit revealer?

A RootkitRevealer is a program for Windows that allows users to check for signs of malware that are known as rootkits. (like viruses, spyware, and Trojan horses). Using a RootkitRevealer can help detect problems and assist the user in making their computer faster and more secure.


What is the most dangerous virus known to computers?

Trojan horse viruses and worms.


Who Started the Trojan Horse Virus?

There are many different Trojan horse viruses, which have been written by computer hackers usually for illegal or malicious purposes.The first known Trojan Horse virus was called ANIMAL written by John Walker in 1974; it was a relatively harmless compared to more recent viruses.


Can viruses transfer from itouch to computer that your sharing wifi with?

There are no known iTouch viruses.


What does anti-virus software protect against?

Viruses. malwares,spywares,trojan horses etc...


How many websites can infect your computer with known viruses?

300,000


Why does Free Realms have virus?

Easy. Free realms requires to be downloaded, which feeds info into your computer and viruses flow in with it. Thousands play it, and that right there is a golden oppurtunity for the viruses to attach to the website game and infect your computer. This is known as a Trojan horse, and you know what I mean if you`ve heard the story before. Google it if you don`t know what that`s all about.


What are some harmful effects viruses can have on society?

Computer viruses have been known to cause millions of dollars worth of damage.


How does virus affects the computer?

General VirusesGeneral computer viruses are packages of software that hide alongside other programs that seem valid. In most cases the virus is so small, and so well hidden, that by the time a user realizes it has "piggybacked" with his downloaded program, the virus has already started to cause its damage. Most general viruses act like human viruses. They do this by entering your system, and then taking advantage of it by using its components to duplicate itself and spread.TrojansA Trojan virus, sometimes referred to as a Trojan horse, is named after its historical namesake. Just like the Trojan horse in world history, a Trojan disguises itself as something that it's not, but does not make itself known until it has made it onto your computer. Trojans can masquerade as games, programs or documents that you download online. Once you open the executable file, the Trojan installs instead of the program and infects your computer. The Trojan can then cause its damage, sometimes even erasing your hard disk. Unlike a general virus, a Trojan is unable to duplicate itself automatically.WormsA worm is an infection that exploits network connections. When a worm downloads itself onto your computer it uses network connections to other computers, as well as security holes to duplicate itself and spread. A worm uses one computer on a network system to scan all the other computers it is connected to for security holes. Once the worm finds a hole on another computer on the network, it copy and pastes itself into that computer by exploiting the security hole. It continues replicating until it runs out of computers to infect.Email VirusesAn email virus spreads as an attachment to an email. Sometimes this attachment can be seen, and other times it can't. Some email viruses can load onto your computer simply by opening an email into the preview frame. Once the virus has been opened, it automatically downloads its attachment to your computer. Some email viruses can also hijack your computer and send out copies of itself to everyone on your contacts list.


How does a computer virus destroys the data?

No known viruses destroy data, though many block it.