6.1.6.2.3.6. Rootkit
6.1.6.2.3. Network connections between the host and unknown remote systems
6.1.6.2.3.6. Rootkit
6.1.6.2.3.1. Network Service Worm
6.1.6.2.3.2. Trojan Horse
6.1.6.2.3.3. Malicious Mobile Code
6.1.6.2.3.4. Backdoor
6.1.6.2.3.5. Keystroke Logger
6.1.6.2.3.7. Malicious Browser Plug-Ins
6.1.6.2.3.8. E-mail Generators
By
Efrain Ortiz