{"id":364,"date":"2012-04-24T03:02:20","date_gmt":"2012-04-23T20:02:20","guid":{"rendered":"https:\/\/dosen.unila.ac.id\/rasp\/?p=364"},"modified":"2012-04-24T03:02:20","modified_gmt":"2012-04-23T20:02:20","slug":"kamko-4","status":"publish","type":"post","link":"https:\/\/dosen.unila.ac.id\/rasp\/2012\/04\/24\/kamko-4\/","title":{"rendered":"Kamko 4"},"content":{"rendered":"<p>Computer Crimes<\/p>\n<p>Crimes that create havoc inside a computer<\/p>\n<div>\u2022Trojan horses, computer viruses, and logic bomb fall into this category. A trojan horse is a set of unauthorized instructions hidden in a legitimate program, such as an operating system.<\/div>\n<div>\u2022The intent of trojan horse programmers is, by definition, malicious or criminal. The trojan horse is a carrier of computer viruses and logic bombs.<\/div>\n<div>A virus is<\/div>\n<div>\n<div>\u2022A Trojan horse that propagates versions of itself into other computer systems. A virus can result in the display of a harmless political message or in the devastating loss of all programs and data.<\/div>\n<div>\u2022A logic bomb is a Trojan horse that is executed when a certain set of conditions are met. For example &#8230;<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Computer Crimes Crimes that create havoc inside a computer \u2022Trojan horses, computer viruses, and logic bomb fall into this category. A trojan horse is a set of unauthorized instructions hidden in a legitimate program, such as an operating system. \u2022The intent of trojan horse programmers is, by definition, malicious or criminal. The trojan horse is &hellip; <a href=\"https:\/\/dosen.unila.ac.id\/rasp\/2012\/04\/24\/kamko-4\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Kamko 4&#8221;<\/span><\/a><\/p>\n","protected":false},"author":14,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[],"class_list":["post-364","post","type-post","status-publish","format-standard","hentry","category-computer-security"],"_links":{"self":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts\/364"}],"collection":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/comments?post=364"}],"version-history":[{"count":0,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts\/364\/revisions"}],"wp:attachment":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/media?parent=364"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/categories?post=364"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/tags?post=364"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}