| http://www.w3.org/ns/prov#value | - Whereas the icon of the Trojan is usually the default icon of the executable files, the hacker maybechange the Trojan???s icon and fake it as a harmless application or even another application such as aMicrosoft Word document or a text file.
|