Back to Results
First PageMeta Content
English phonology


Tro ja n H o rse S ince the author of m alic ious c ode needs to disguise it s om ehow s o that it will be invoked by a nonm alic ious user (unless the author m eans als o to invoke the code, in whic h cas e he or she pr
Add to Reading List

Document Date: 2006-09-13 14:57:15


Open Document

File Size: 49,68 KB

Share Result on Facebook

City

perm / /

Company

In co / /

Facility

Laboratory N R L/FR / /

IndustryTerm

e-bom / software engineering literature / software life / es software flaws / software sys tem / ay exploit hardware / operational software / Internet worm / e-of / large software system / upport software / e-tim / alicious software / e -u / software testing tools / software life cycle / /

Position

author / rt / supervisor / king / ve rt / security analyst / ecurity analyst / Trojan horse editor / /

ProgrammingLanguage

R / C / L / /

Technology

dom / operating system / /

SocialTag