home *** CD-ROM | disk | FTP | other *** search
/ New Perspectives on Comp…er Concepts (3rd Edition) / NP3CD_Intro.iso / NP3CD / PAGE366.PAG < prev    next >
Graphics Interchange Format  |  1997-11-02  |  30KB  |  623x1043  |  8-bit (108 colors)
Labels: book | chat room | crt screen | hakham | monitor | plant | sky | tree | window
OCR: 9-10 DATA ECURITY AND CONTRO Time Bomb nd Logic Bo mbs Can virus iurk my computer systerm without my knowledge? Although virus usually begins to replicate itse f immediately when enters vour computer system, it will not nec- ess arily deliver its right away Avirus or other unwelcome surprise can in your computer system for days or months without discovery. time bomb is computer pro- gram that stays in Your system undetected until it is trigg ered by certain event ir time such as when the computer systerm clock reaches cert ain date time bomb usually carried by virus Trojan horse 10 example the Michelangelo virus contains time qooq designed to dama ige files on your hard on March the birthday o1 Michelangelo. The Olivia virus activates on April 10th and December 23rd automatically opens the ...