6.1.6.2.3.2. Trojan Horse
6.1.6.2.3. Network connections between the host and unknown remote systems
6.1.6.2.3.2. Trojan Horse
6.1.6.2.3.1. Network Service Worm
6.1.6.2.3.3. Malicious Mobile Code
6.1.6.2.3.4. Backdoor
6.1.6.2.3.5. Keystroke Logger
6.1.6.2.3.6. Rootkit
6.1.6.2.3.7. Malicious Browser Plug-Ins
6.1.6.2.3.8. E-mail Generators
By
Efrain Ortiz