What are some of the actions that Trojans can perform?

What will be an ideal response?


Trojans, like any commercial remote administrative application, can be written to perform almost any task that a legitimate user can perform:* Sending and receiving files* Viewing cached passwords* Restarting the system* Launching processes* Modifying files* Sharing files* Modifying the registry keys

Computer Science & Information Technology

You might also like to view...

What kind of iterators does the stack template container have?

What will be an ideal response?

Computer Science & Information Technology

In Windows, explain how to determine what type of hardware you have, if you do not have the manual.

What will be an ideal response?

Computer Science & Information Technology

Initially, records entered into an Access table will display in the order in which they are entered.

a. true b. false

Computer Science & Information Technology

A yellow marker known as the playhead is displayed at the top of the Timeline to mark the current location.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology