Distinguish between keystroke loggers, password-stealing spyware, and data mining spyware.
What will be an ideal response?
Answer: Keystroke logger: Captures all your keystrokes
Password-stealing sw: tells you that you have been logged out of the server you are visiting and asks you to retype your user/pass -- then sends this information to attacker.
Data-mining spyware: Searches through your HD for same types of information sought by keystroke loggers, then sends it to attacker.
You might also like to view...
Write a method called maxOfTwo that accepts two integer parameters and returns the larger of the two.
What will be an ideal response?
A ____ background is the easiest to read for most users.
A. white B. light blue C. red D. green
System Restore can restore applications and settings to an earlier point in time, but it does not back up or restore any personal data files
Indicate whether the statement is true or false
In the accompanying figure, item A is used to identify the _______________ for a new folio.
Fill in the blank(s) with the appropriate word(s).