DariaRich101

From Indpaedia
Revision as of 08:51, 17 January 2013 by 216.152.248.83 (Talk)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

Hindi English French German Italian Portuguese Russian Spanish

The original trojan horse was built by Odysseus, the King of Ithica, in the course of the legendary Trojan Wars. The Greeks were losing the siege of the city of Troy. Odysseus had a significant wooden horse built and left as a "gift" outside the walls of the city of Troy. He then ordered the Greek army to sail away.

The Trojans believed the horse to be a peace offering from Odysseus. As an alternative, the horse was filled with Greek warriors, including Odysseus and Menelaus. As the Trojans slept, the Greek army sailed back to Troy and the soldiers hiding in the wooden horse snuck out and opened the gates of the city for them.

The Personal computer Trojan Horse

A computer trojan horse is a program which seems to be some thing very good, but really conceals something bad.

1 way to spread a trojan horse is to hide it inside a distribution of normal software program. In 2002, the sendmail and OpenSSH packages had been both employed to hide trojan horses. This was accomplished by an attacker who broke into the distribution internet sites for these software program packages and replaced the original distributions with his personal packages.

A more prevalent method of spreading a trojan horse is to send it by way of e-mail. The attacker will send the victim an e-mail with an attachment named some thing like "prettygirls.exe." When the victim opens the attachment to see the fairly girls, the trojan horse will infect his technique.

A equivalent technique for spreading trojan horses is to send files to unsuspecting users over chat systems like IRC, AIM, ICQ, MSN, or Yahoo Messenger.

The Trojan Horses Virus

As opposed to viruses, trojan horses do not typically spread themselves. Trojan horses need to be spread by other mechanisms.

A trojan horse virus is a virus which spreads by fooling an unsuspecting user into executing it.

An instance of a trojan horse virus would be a virus which essential a user to open an e-mail attachment in Microsoft Outlook to activate. As soon as activated, the trojan horse virus would send copies of itself to folks in the Microsoft Outlook address book.

The trojan horse virus infects like a trojan horse, but spreads like a virus.

Effects of a Trojan Horse

The victim running the trojan horse will generally give the attacker some degree of handle more than the victim's machine. This manage could permit the attacker to remotely access the victim's machine, or to run commands with all of the victim's privileges.

The trojan horse could make the victim's machine element of a Distributed Denial of Service (DDoS) network, where the victims machine is employed to attack other victims.

Alternatively, the trojan horse could just send information to the attacker. Data frequently targeted by trojan horses incorporates usernames and passwords, but a sophisticated trojan horse could also be programmed to look for things such as credit card numbers.

Safeguarding Against a Trojan Horse

Anti-virus applications detect recognized trojan horses. Nevertheless, trojan horse programs are less complicated to generate than viruses and numerous are created in tiny volumes. These trojan horse applications will not be detected by anti-virus software program.

The greatest defense against a trojan horse is to never run a system that is sent to you. E-mail and chat systems are not risk-free methods of software distribution.

Spyware and adware

A lot of individuals think about spyware and adware to be types of a trojan horse.

Spyware applications perform a helpful function, and also install a program that monitors usage of the victim's pc for the goal of advertising and marketing to the user.

Adware programs are similiar to spyware programs, except the extra computer software they set up shows advertising messages directly to the user. like us on facebook

Personal tools
Namespaces

Variants
Actions
Navigation
Toolbox
Translate