Trojan Horse Lab

Loading...
Thumbnail Image
Authors
Advisors
Second Readers
Subjects
Trojan horse
capturing keystrokes
capturing data
capturing passwords
Date of Issue
2006-12-11
Date
Publisher
Language
Abstract
This interactive tutorial describes the fundamental purpose of a Trojan horse and how hackers use it to access data.
Type
Interactive Media Element (IME)
Description
quiz
present
Quiz
Presentation
Interactive Media Element
Department
Identifiers
NPS Report Number
Sponsors
Funding
Format
Citation
Distribution Statement
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Collections