1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liberstina [14]
3 years ago
7

Pharming involves redirecting users to a fraudulent Web site even when the user has typed in the correct address in the Web brow

ser. pretending to be a legitimate business's representative in order to garner information about a security system. setting up fake Web sites to ask users for confidential information. using e-mails for threats or harassment.
Computers and Technology
1 answer:
Anna35 [415]3 years ago
8 0

Answer:

Pharming involves:

redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser.          

Explanation:

  • When a hacker steals your confidential and private information by installing a malicious code on your computer which misdirects you to fake and fraudulent websites, this is called pharming.
  • Hacker installs virus on your computer which manipulates the host files on your computer.
  • The hacker uses DNS cache poisoning to attack DNS services on your computer which makes many users to enter fraudulent site, unknowingly, as they type the URL of the real website.
  • These fraudulent website developed by hacker can install virus on your computer and steal confidential information from your computer.
  • Pharming is done by hackers in order to steal sensitive data from a person's computer.
You might be interested in
In a black box model are the customers told that they should be expecting to be haxked?
Licemer1 [7]
Uhhhhhhhhhhh maybe tbh i have noooo idea.
6 0
3 years ago
In Excel, you can sort a table by one or more columns by.
timofeeve [1]
Ushsbcjdiosjdhwjwjif math
8 0
3 years ago
The movement of the economy through highs and lows is referred to as:
skad [1K]

Answer:

the business cycle

Explanation:

5 0
3 years ago
Which statements describe the use of styles in Word? Check all that apply.
algol [13]

Answer:

can be used to make word docments look the same

Explanation:

4 0
3 years ago
Read 2 more answers
Is a bottle opener considered an engineered item?
KIM [24]
Yes actually it is it’s a machine to use for opening bottles such as cans n other
3 0
3 years ago
Other questions:
  • What is computer? Explain the characteristics of computer.<br>​
    12·1 answer
  • The ___________________ Act makes it illegal to deactivate or otherwise disable any antipiracy technologies including DRM techno
    7·1 answer
  • When can we feel electricity?? Tell me the volt
    15·1 answer
  • . public members are accessible from ________________ where the object is visible
    9·1 answer
  • After adjusting your seat, your _____ should be as close as possible to the backrest
    7·2 answers
  • Cash cows are always in
    7·1 answer
  • Of all excavation hazards, _______ poses the greatest risk
    8·1 answer
  • Formatting means ____________
    12·2 answers
  • Add me on Fortnite. Epic is smashman892. *Ik it sux but it's an old account* Comment ur epic
    6·2 answers
  • An application's certificate indicates the application -
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!