1. These are computer programs designed to work on the target computer 's software. 2. Opening the infected file resulted in infection of the target computer . 3. Cross compilers are used for embedded development, where the target computer has limited capabilities. 4. Murray said that the target computer was at the Naval Research Laboratory in Washington. 5. SYDI is built around scripts which can target computers running the Python programming language. 6. The target computer decodes the address and displays the page. 7. SSH from the remote computer to the target computer . 8. Govware is typically a trojan horse software used to intercept communications from the target computer . 9. The attacker can then use Back Orifice to install the NetBus server on the target computer . 10. They usually target computer equipment and electronics in warehouses located in cities with large distribution centers.