Y2K Challenges
Two Broad Categories of Challenges for Y2K
Trojan Horse and Malicious Code Insertions
Y2K “event” Exploitations
Previous slide
Next slide
Back to first slide
View graphic version