Explore BrainMass

Explore BrainMass

    Examples of threats, vulnerabilities, and exploits

    This content was COPIED from BrainMass.com - View the original, and get the already-completed solution here!

    You answered a previous posting today (attached answer). I was wondering if you could please help me again with a couple of questions.

    Is the DNS modification taking place on the user's system or actually on a DNS server?

    Do you know of any other 'modifications' it makes?

    © BrainMass Inc. brainmass.com October 9, 2019, 11:28 pm ad1c9bdddf


    Solution Preview


    The trojan TROJ_JAHLAV.B will alter the DNS settings of the user's system.

    This results in the users surfing the ...

    Solution Summary

    This posting contains answers to the given questions. Examples of threats, vulnerabilities and exploits are determined.