This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Trojan Horse"

From OWASP
Jump to: navigation, search
(Examples)
m (Reverted edits by Nganbinh (Talk); changed back to last version by Weilin Zhong)
Line 4: Line 4:
  
 
==Examples ==
 
==Examples ==
ghfghgj
 
  
 
==Related Threats==
 
==Related Threats==

Revision as of 12:37, 3 July 2006

This is an Attack. To view all attacks, please see the Attack Category page.


Description

Examples

Related Threats

Related Attacks

Related Vulnerabilities

Related Countermeasures

Categories

This article is a stub. You can help OWASP by expanding it or discussing it on its Talk page.