trojan horses, malware of any kind ...

Do they run on their own, do they need to be run and do they need
permission?

Trojans are usually run by the user and do harmful operations in the background, but a trojan could also install "Login Items". Of course they need permissions - When run by the user (or as a "Login Items"t) they have the permission of the user, which would be sufficient to uninstall other "Login Items".

HTH
regards
martin
_______________________________________________
Littlesnitch-talk mailing list
[email protected]
http://at.obdev.at/mailman/listinfo/littlesnitch-talk

Reply via email to