First page Back Continue Last page Summary Graphic
48. Trojan a Browser
- Corrupt the browser via a Trojan horse so that it makes it look like the cryptosystem is in use when it is not.
- For example, make the lock appear to be locked in Netscape. 
Notes: