home *** CD-ROM | disk | FTP | other *** search
/ New Perspectives on Comp…er Concepts (3rd Edition) / NP3CD_Intro.iso / NP3CD / PAGE365.PAG < prev    next >
Graphics Interchange Format  |  1997-11-02  |  54KB  |  623x1043  |  8-bit (108 colors)
Labels: carrot | computer | crt screen | hakham | keyboard | laptop | monitor | plant | plaything | teddy bear | television receiver | tv
OCR: OP PUTEI CRIM Mod - rn Troja Horse How canI avoid being fooled bya Trojan horse? At the beginning of this chapter, you learned about the legendary Trojan horse modern Trojan horse . computer program that appears to perform one function while actually doing something else. Trojan horse carry a virus that replicates itself once it reaches your computer sy stem. Hackers also design Trojan horses that tuop carry replicating viruses bnq that do other damage For example suppose hacker writes program to format hard and embeds this progr arT in file called Sched. .exe The hacker then distributes disks containing this Trojan horse and posts on the Internet where other users are likely assume free scheduling pro- gram. Users who download and run Sched. exe will discover that the progr am has erased ...