正在加载图片...
Figure 9-2: Malware Payloads After propagation viruses and worms execute their payloads(damage code Payloads erase hard disks, send users to pornography sites if they mistype URLS Trojan horses are exploitation programs that disguise themselves as system files7 Figure 9-2: Malware • Payloads – After propagation, viruses and worms execute their payloads (damage code) – Payloads erase hard disks, send users to pornography sites if they mistype URLs – Trojan horses are exploitation programs that disguise themselves as system files
<<向上翻页向下翻页>>
©2008-现在 cucdc.com 高等教育资讯网 版权所有