Briefly describe the main characteristics of the Trojan AIDS.

What will be an ideal response?


This Trojan was distributed through the postal mail in 1989. It arrived on a floppy disk that allegedly contained information about AIDS (Acquired Immune Deficiency Syndrome) and HIV (Human Immunodeficiency Virus). The actual payload was aids.exe, which would encrypt the hard drive. The AIDS Trojan prompted the user to pay a fee for the password needed to decrypt the hard drive. The AIDS Trojan was unique because rather than destroy files, it held them hostage, demanding a ransom before the user could open and use the files again.

Computer Science & Information Technology

You might also like to view...

This could happen when the DHCP server cannot lease out an IP address due to its DHCP pool being depleted. To typical users though, getting a 169 IP address may confuse them as it looks just another IP address to them. The term for this is which of the following?

What will be an ideal response?

Computer Science & Information Technology

Why is the alias mechanism useful?

What will be an ideal response?

Computer Science & Information Technology

In the accompanying figure, clicking on item 1 will ____.

A. rename the layer B. expand or collapse the layer C. activate the layer D. delete the layer

Computer Science & Information Technology

A special motherboard chip that executes instructions, performs math calculations, and coordinates input/output operations is called the

A) Microprocessor B) Processor C) CPU D) All these answers are true.

Computer Science & Information Technology