6.1.6.2.3.5. Keystroke Logger
6.1.6.2.3. Network connections between the host and unknown remote systems
6.1.6.2.3.5. Keystroke Logger
6.1.6.2.3.1. Network Service Worm
6.1.6.2.3.2. Trojan Horse
6.1.6.2.3.3. Malicious Mobile Code
6.1.6.2.3.4. Backdoor
6.1.6.2.3.6. Rootkit
6.1.6.2.3.7. Malicious Browser Plug-Ins
6.1.6.2.3.8. E-mail Generators
By
Efrain Ortiz