answersLogoWhite

0

Many things.

It can delete or damage files, and in so doing, destroy your personal files or your operating system. It can also overclock you processor to the point of failure or destroy it in other ways. It can also wear out Flash Memory or even RAM by sending excessive read/write commands for long periods of time, but this in not a common attack.

The most common in what I first mentioned: File manipulation. This is usually done to destroy your operating system.

User Avatar

Wiki User

10y ago

Still curious? Ask our experts.

Chat with our AI personalities

FranFran
I've made my fair share of mistakes, and if I can help you avoid a few, I'd sure like to try.
Chat with Fran
RafaRafa
There's no fun in playing it safe. Why not try something a little unhinged?
Chat with Rafa
BeauBeau
You're doing better than you think!
Chat with Beau
More answers

It is possible for a hacker to maliciously inject code into another user's computer by inserting the code into a jpeg image, a pdf document or a macro, or inserting malicious script in a guest book entry. The code, usually written in php, contains commands that will alter the behaviour of the computer.

User Avatar

Wiki User

11y ago
User Avatar

viewing e-mail in plain text

User Avatar

Wiki User

13y ago
User Avatar

Add your answer:

Earn +20 pts
Q: How can you unknowning install malicious code on your computer?
Write your answer...
Submit
Still have questions?
magnify glass
imp