This document discusses different types of malicious programs including viruses, worms, Trojans, and illicit servers. Viruses and worms replicate themselves and consume resources, while Trojans appear harmless but cause harm. Illicit servers install hidden services on infected systems.
This document discusses different types of malicious programs including viruses, worms, Trojans, and illicit servers. Viruses and worms replicate themselves and consume resources, while Trojans appear harmless but cause harm. Illicit servers install hidden services on infected systems.
This document discusses different types of malicious programs including viruses, worms, Trojans, and illicit servers. Viruses and worms replicate themselves and consume resources, while Trojans appear harmless but cause harm. Illicit servers install hidden services on infected systems.
This document discusses different types of malicious programs including viruses, worms, Trojans, and illicit servers. Viruses and worms replicate themselves and consume resources, while Trojans appear harmless but cause harm. Illicit servers install hidden services on infected systems.
A malicious program designed to damage computer systems.
A self-replicating program or algorithm that consumes system and network resources. A program that appears to be harmless but actually produces harmful results. They are named for the mythical Trojan horse that brought down the kingdom of Troy. An application that installs hidden services on systems.