3.9 Trojans  




Trojans can un approved tracing of important login details of users online.

  •  Email Virus.
  •  This is a virus spread through an email. 
  • This virus hide in an email and when the receiver receives the mail it is spread widely 

 3.9 Browser Hijacker 



It can be spread while downloading; it affects the browsers functioning of basically redirection of the user to certain sites.

Example is: the cool web search Boot Infectors It include the root sector and the master boot record, they infect the hard disk or the floppy.