week-11 discussion

 What are some of the characteristics and operations of some of the malicious software that exists today? 

Tags: No tags