maria bedoya sp11tca-3
Saturday, February 19, 2011
Trojan Horse
that appears to perform a desirable function for the user but instead facilitates unauthorized access to the user's computer system.
No comments:
Post a Comment
Newer Post
Older Post
Home
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment