Essay Database
Trojan and viruses.
Date Submitted: 11/21/2004 19:03:01
What is a trojan? A trojan horse could be either: a) Unauthorized instructions contained within a legitimate program. These instrcutions perform functions unknown to (and probably unwanted by) the user.
b) A legitimate program that has been altered by the placement of anauthorized instructions within it. These instructions perform functions unknown to (and probably unwanted by) the user.
c) Any program that appears to perform a desirable and necessary function but that (because of unauthorized
Is this Essay helpful? Join now to read this particular paper
and access over 800,000 just like this GET BETTER GRADES
and access over 800,000 just like this GET BETTER GRADES
types of trojans listed above, so you could get to know them better and be able to remove them in case you get infected.
Other tutorials by BSRF ----------------------- * FTP Security.
* Sendmail Security.
* Overclocking.
* Ad and Spam Blocking.
* Anonymity.
* Info-Gathering.
* Phreaking.
* Advanced Phreaking.
* More Phreaking.
* IRC Warfare.
* Proxies, Wingates and SOCKS Firewalls.
* RM Networks.
* The Windows Registry.
* ICQ Security.
* Hardware.
* Cracking.
* HTML.
* Javascript.
* Easy Linux Installation Guide.
* Basic Local/Remote Unix Security.
And many more!
Need a custom written paper? Let our professional writers save your time.