Example: bankruptcy
Introduction to Computer Security

Introduction to Computer Security

Back to document page

a) Record keystrokes and steal passwords. b) Send spam and phishing emails. c) Harvest and sell email addresses and passwords. d) Access restricted or personal information on your computer or other systems that you have access to. e) Infect other systems. f) Hide programs that launch attacks on other computers.

  Tesla

Download Introduction to Computer Security

15
Please wait..

Information

Domain:

Source:

Link to this page:

Please notify us if you found a problem with this document:

Other abuse

Related search queries