Documente Academic
Documente Profesional
Documente Cultură
E.g.W32.Mydoom.AX@mm
Computer Trojans
• Trojan horses are impostors: files that claim to be
something desirable but, in fact, are malicious. Trojan
horse programs do not replicate themselves. Trojan
horses contain malicious code that when triggered cause
loss, or even theft, of data. E.g. Trojan.Vundo
• Real-Time Scanning
The antivirus software is automatically running in the
background on a continuous basis, scanning files and
folders for possible virus attacks as they are opened or
executed, and checking e-mails as they are downloaded.
• Log file
• Quarantine
• New virus definitions
• Subscription
• Virus database
• License key
Example of a Log
Bibliography