Essay database with free papers will provide you with original and creative ideas.
Trojan and viruses.
What is a trojan? A trojan horse could be either: a) Unauthorized instructions contained within a legitimate program. These instrcutions perform functions unknown to (and probably unwanted by) the user. b) A legitimate program that has been altered by the placement of anauthorized instructions within it. These instructions perform functions unknown to (and probably unwanted by) the user. c) Any program that appears to perform a desirable and necessary function but that (because of unauthorized
types of trojans listed above, so you could get to know them better and be able to remove them in case you get infected. Other tutorials by BSRF ----------------------- * FTP Security. * Sendmail Security. * Overclocking. * Ad and Spam Blocking. * Anonymity. * Info-Gathering. * Phreaking. * Advanced Phreaking. * More Phreaking. * IRC Warfare. * Proxies, Wingates and SOCKS Firewalls. * RM Networks. * The Windows Registry. * ICQ Security. * Hardware. * Cracking. * HTML. * Javascript. * Easy Linux Installation Guide. * Basic Local/Remote Unix Security. And many more!