Crime Classification Manual Part II Chapter 10 A 11
Crime Classification Manual Part II Chapter 10 A 11
A STANDARD SYSTEM FOR INVESTIGATING AND
CLASSIFYING VIOLENT CRIMES SECOND EDITION
The key
logger can be used to exploit a user’s financial accounts by posing as the user.
Another type of Trojan horse is a program that turns the user system into a
spam generator. When spam is sent to the infected computer, it forwards that
spam to all the addresses contained in the address books resident on the
computer.
Comments
Post a Comment