First page Back Continue Last page Summary Graphic
48. Trojan a Browser
Corrupt the browser via a Trojan horse so that it makes it look like the cryptosystem is in use when it is not.
For example, make the lock appear to be locked in Netscape.
Notes: