Trojan Horses definition
Examples of Trojan Horses in a sentence
Licensor warrants that the licensed product as delivered by Licensor does not contain any viruses, worms, Trojan Horses, or other malicious or destructive code to allow unauthorized intrusion upon, disabling of, or erasure of the licensed products (each a “Virus”).
The Licensor warrants that the Licensed Products as delivered by the Licensor does not contain any viruses, worms, Trojan Horses, or other malicious or destructive code to allow unauthorized intrusion upon, disabling of, or erasure of the Licensed Products (each a “Virus”).
Mails, Code Or Files Which Contain Computer Viruses Or Corrupted Data Or Trojan Horses Or Tools Which Compromise The Security Of Web Sites Or User Data.
This software must (i) be configured to continuously monitor the systems and files for characteristics of viruses, worms, spyware, and Trojan Horses; (ii) be capable of generating detailed audit logs; and (iii) be installed in auto-protect, full-time, or real-time mode.
Licensor warrants that the Licensed Product as delivered by Licensor does not contain any viruses, worms, Trojan Horses, or other malicious or destructive code to allow unauthorized intrusion upon, disabling of, or erasure of the Licensed Products (each a “Virus”).
You may not knowingly, willfully, or negligently incorporate any malicious or harmful code, viruses, Trojan Horses, worms, time bombs, cancelbots, or other malware in your Developer Software.
Code Or Files Which Contain Computer Viruses Or Corrupted Data Or Trojan Horses Or Tools Which Compromise The Security Of Web Sites Or User Data.
We use industry standard practices to avoid the inclusion of any program, routine, subroutine, or data (including malicious software or “malware,” viruses, worms, and Trojan Horses) in applications running within Genesys services.
This includes but is not limited to Trojan Horses, Worms and Time or Logic Bombs.
Distributing information regarding the creation of and sending Internet viruses, worms, Trojan Horses, pinging, flooding, mailbombing, or denial of service attacks.