is a program that damages or compromises the security of
someone emailing it to you. It may arrive in the form of a jo
is a computer virus that actively attacks an anti-virus prog
programs in an effort to prevent detection
5 This Trojan horse was initially a virus hoax but later become
6. These are parasitic computer programs that replicate
program files. They can create copies on the same comp
computers via a network. They often spread via IRC (Inter
7. in 1987, one of the most common viruses was detected
Her both FYF and CON files and deleting any pro
Answers
Answered by
0
Answer:
you can use trogen horse
Explanation:
Similar questions