6.1.6.2.3.8. E-mail Generators
6.1.6.2.3. Network connections between the host and unknown remote systems
6.1.6.2.3.8. E-mail Generators
6.1.6.2.3.1. Network Service Worm
6.1.6.2.3.2. Trojan Horse
6.1.6.2.3.3. Malicious Mobile Code
6.1.6.2.3.4. Backdoor
6.1.6.2.3.5. Keystroke Logger
6.1.6.2.3.6. Rootkit
6.1.6.2.3.7. Malicious Browser Plug-Ins
By
Efrain Ortiz