A piece of unauthorized computer code, usually delivered via e-mail. It attacks a system after verifying certain conditions within that system.
a delayed action computer virus; a set of instructions surreptitously inserted into a program that are designed to execute (or `explode') if a particular condition is satisfied; when exploded it may delete or corrupt data, or print a spurious message, or have other harmful effects; "a disgruntled employee planted a logic bomb"
a computer program executed at a specific time to cause damage to computer programs or data
a form of sabotage in which a programmer inserts code that causes the program to perform a destructive action when some triggering event, such as termination of the programmer's employment, occurs
a heuristic computer virus that is used to execute malignant computer functions either upon command or when certain pre-defined conditions are met
an attack triggered by an event, like the computer clock reaching a certain date
a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met
a program normally hidden deep in the main computer and set to activate at some point in the future, destroying data
a program or code fragment which triggers an unauthorized, malicious act when some predefined condition occurs
a program, or portion of a program, which lies dormant until a specific piece of program logic is activated
a program that "detonates" when some event occurs
a program that runs at a specific date and/or time to cause unwanted and/or unauthorized functions
a program which has deliberately been written or modified to produce results when certain conditions are met that are unexpected and unauthorized by legitimate users or owners of the software
a set of instructions in a computer program periodically executed in a computer system that determines conditions or states of the computer, facilitating the perpetration of an unauthorized, malicious act
a small program attached to a virus, a worm, or a Trojan horse, that triggers when the destruction will begin
a software program that is
a Trojan horse whose effects are triggered by the occurrence of some logical event
Dormant code added to software that is triggered by a predetermined time or event.
a.k.a. slag code. A program that hides until a specific, pre-programmed condition is met; at which point it executes. Typically, the function of such programs is to destroy or otherwise make some vital portion of a computer's operating code inoperable. The name "logic bomb" derives from the fact that most run "Boolean" or "logic" checks to see if its trigger condition is met. If the trigger condition is met, the check function of these programs returns a (logical) "true" state, and the program runs.
A program inserted into software by an intruder. A logic bomb lies dormant until a predefined condition is met; the program then triggers an unauthorized act.
Also known as a Fork Bomb - A resident computer program which, when executed, checks for a particular condition or particular state of the system which, when satisfied, triggers the perpetration of an unauthorized act.
A computer program that is triggered under certain conditions specific to the requirements set forth by the programmers of the logic bomb. Trigger conditions may be a date or time combination. When the Logic Bomb is triggered, it then makes copies of itself, "exploding," until the entire system is locked.
Usually of payloads; code that only runs when particular logical conditions are met while executing the virus or Trojan carrying it.
When a Trojan Horse is left to lie dormant, only to attack when the conditions are just right.
A logic bomb is a type of trojan horse that executes when specific conditions occur. Triggers for logic bombs can include a change in a file, by a particular series of keystrokes, or at a specific time or date. See: Time Bomb
A destructive command that executes when certain conditions within a system or a program are met.
A program which runs when logical conditions are met. The term normally refers to Malware placed by an inside source in their own company network as an act of revenge.
A logic bomb is a program which will execute a pre-programmed routine (frequently destructive) when a designated condition is met. Logic bombs do not make copies of themselves.
A program that allows a Trojan horse to lie dormant and then attack when the conditions are just right.
A Trojan Horse (see below), which is left within a computing system with the intent of it executing when some condition occurs. The logic bomb could be triggered by a change in a file (e.g. the removal of the designer's userid from the list of employees of the organization), by a particular input sequence to the program, or at a particular time or date (see "Time Bomb" below). Logic bombs get their name from malicious actions that they can take when triggered.
Unauthorized computer code, sometimes delivered by email, which, when executed, checks for particular conditions or particular states of the system which, when satisfied, triggers the perpetration of an unauthorized, usually destructive, act.
Virus that activates when it detects a certain condition. 12.4
Any program or code, generally malicious, that causes a system to lock up or fail.
Logic Bomb are Jonas Pettersson and Johan Krafft, a psychedelic trance project from Sweden.