View Single Post
ysss's Avatar
Posts: 4,384 | Thanked: 5,524 times | Joined on Jul 2007 @ ˙ǝɹǝɥʍou
#10
Virus self-replicates without the user's intervention by exploiting OS/apps vulnerabilities.

Trojan requires the user to trigger execution of its payload, generally disguised as something benign.

All OS (including Linux) are vulnerable to trojans, if the user is duped to run the infected binary.
__________________
Class .. : Power User
Humor .. : [#####-----] | Alignment: Pragmatist
Patience : [###-------] | Weapon(s): Galaxy Note + BB Bold Touch 9900
Agro ... : [###-------] | Relic(s) : iPhone 4S, Atrix, Milestone, N900, N800, N95, HTC G1, Treos, Zauri, BB 9000, BB 9700, etc

Follow the MeeGo Coding Competition!
 

The Following User Says Thank You to ysss For This Useful Post: