Trojan Horse Lab
Loading...
Authors
Advisors
Second Readers
Subjects
Trojan horse
capturing keystrokes
capturing data
capturing passwords
capturing keystrokes
capturing data
capturing passwords
Date of Issue
2006-12-11
Date
Publisher
Language
Abstract
This interactive tutorial describes the fundamental purpose of a Trojan horse and how hackers use it to access data.
Type
Interactive Media Element (IME)
Description
quiz
present
Quiz
Presentation
Interactive Media Element
present
Quiz
Presentation
Interactive Media Element
Series/Report No
Department
Identifiers
NPS Report Number
Sponsors
Funding
Format
Citation
Distribution Statement
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
