First page
Back
Continue
Last page
Graphics
Malicious Programs
Two
categories:
Those that need a
host
program – fragments of programs -
parasitic
Those that are
independent
– self contained
Some
replicate
– used as a
differentiator