|
Trojan Horses:The following malware are Trojan Horses. Any destructive program containing malicious code while appearing as a desirable application to avoid detection and to better be further distributed because it can't replicate itself is a Trojan Horse. For a complete alphabetical list of all viruses, worms, and Trojan Horses, see the previous link. For a better understanding of the virus naming system, please see our primer on that subject.
Copyright (c) 2004-2008 A. Ryan Robbins. All Rights Reserved.
|
|
|