compromised

(redirected from compromised computer)
Also found in: Dictionary, Legal, Encyclopedia.
Related to compromised computer: hacked

compromised

1. lacking adequate resistance to infection, or lacking the ability to mount an adequate immune response, owing to a course of treatment, e.g. immunosuppressive drugs or infections, irradiation, or to an underlying disorder, e.g. leukemia.
2. lacking a sufficient blood supply to remain viable.
References in periodicals archive ?
7) Upon discovering a compromised computer or network, NetD operators no longer would simply rebuild the system but would use intelligence and perhaps other NetD weapons to identify the intruder.
Often the initial stub program sends out DNS queries looking for the mothership, itself often a compromised computer temporarily acting as a mothership.
According to the security bulletin MS11035, without the patch specially crafted code -- or malware -- could enter and run whatever it wants, putting users at risk for lost data and compromised computer systems.
The Trojan, classified as a downloader, is capable of installing additional malware on the compromised computer.
What Walton found was a thoroughly compromised computer system, infected with so-called "malware" that allowed a mysterious outside entity to not only spy on the computer, but also extract data from it.
The threat searches for a VMware virtual machine image on the compromised computer and, if it finds an image, it mounts the image and then copies itself onto the image by using a VMware Player tool," said Symantec researcher Takashi Katsuki in ablog poston Monday.
The intruders install an "agent' (frequently through a Trojan horse program) that runs on the compromised computer awaiting further instructions.
Instant Message applications such as MSN Messenger([TM]) can also be compromised, resulting in those applications becoming a medium for malicious users taking control over a user's computer by permitting arbitrary remote code execution on the compromised computer.
MRC is free software that evaluates files from potentially compromised computer systems, helping incident responders narrow the scope of an investigation quickly and efficiently.
With this release, IMPACT's in-memory agent can now utilize strong authentication and encrypted communications without requiring the installation of any additional software on the compromised computer.
In addition they open a dangerous back-door on the compromised computer which could be abused later.
He used his zombie army to conduct 102 attacks on sites including Pokemon, Skype and Google, stole 750 different usernames and passwords, and also caused compromised computers to download infected files.