Trojan horse attack

Trojan horse attack
действие (нарушителя) с использованием программы "Троянский конь"

Англо-русский словарь по компьютерной безопасности. . 2011.

Игры ⚽ Поможем написать курсовую

Смотреть что такое "Trojan horse attack" в других словарях:

  • Trojan horse — Tro jan horse , n. [from the incident described in Homer s Iliad.] 1. (Classical mythology) a large hollow wooden horse built by Greek soldiers besieging Troy during the Trojan War, and left as a gift when they pretended to abandon their seige.… …   The Collaborative International Dictionary of English

  • Trojan Horse — The Trojan Horse was part of the Trojan War, as told in Virgil s Latin epic poem The Aeneid . The events of this take place after Homer s Iliad , and before Homer s Odyssey .LegendThis incident is mentioned in the Odyssey :: What a thing was this …   Wikipedia

  • targeted Trojan horse — n. A Trojan horse program sent as an attachment in an e mail message that has a subject line, body text, and return address that have been crafted to fool the recipient into opening the attachment. Also: targeted Trojan, targeted Trojan spoofing …   New words

  • Zeus (trojan horse) — Zbot redirects here. For the action figures, see Zbots. For other uses, see Zeus (disambiguation). Zeus is a Trojan horse that steals banking information by keystroke logging and Form Grabbing. Zeus is spread mainly through drive by downloads and …   Wikipedia

  • AIDS (trojan horse) — AIDS Trojan Common name PC Cyborg Trojan Technical name Aids Info Disk/PC Cyborg Trojan Aliases AIDS!Trojan, Aidsinfo. A trojan, Aidsinfo. B trojan, Cyborg, Trj/AidsInfo. A, Trojan. AidsInfo.a, Trj/AidsInfo. B, Trojan. AidsInfo.b, Trojaids!Trojan …   Wikipedia

  • Trojan War — In Greek mythology, the Trojan War was waged against the city of Troy by the Achaeans after Paris of Troy stole Helen from her husband Menelaus, the king of Sparta. The war is among the most important events in Greek mythology, and was narrated… …   Wikipedia

  • Attack patterns — In computer science, attack patterns are a group of rigorous methods for finding bugs or errors in code related to computer security.Attack patterns are often used for testing purposes and are very important for ensuring that potential… …   Wikipedia

  • Trojan Records — Empresa matriz Sanctuary Records Group Fundación 1968 Fundador(es) Lee Gopthal Género(s) ska rocksteady reggae dub …   Wikipedia Español

  • Trojan Records — infobox record label image bg = #030 parent = Sanctuary Records Group founded = 1968 founder = Lee Gopthal genre = ska rocksteady reggae dub dancehall soul country = United Kingdom url = http://www.trojanrecords.com/Trojan Records is a British… …   Wikipedia

  • denial of service attack — ▪ computer science       type of cybercrime in which an Internet site is made unavailable, typically by using multiple computers to repeatedly make requests that tie up the site and prevent it from responding to requests from legitimate users.… …   Universalium

  • denial of service attack —    An attack by an intruder that prevents a computer system from providing a service. A denial of service attack will typically involve opening and dropping a large number of TCP/IP connections very quickly so that the target system spends all… …   Dictionary of networking


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»