Preview

Trojan Horse

Good Essays
Open Document
Open Document
1102 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Trojan Horse
Trojan Horse - A Definition
A Trojan horse is a program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage, such as ruining the file allocation table on your hard disk.
Trojan Horse Detailed..
Trojan Horse Program is one of the today’s most serious threats to computer security. This program not only effects a user’s computer, but that user can also infect and attack others system unknowingly. In today’s computer world, a Trojan Horse program is defined as “ malicious, security-breaking program that is disguised as something benign”. For example, a user download a file that appears to be a movie or song, but when he clicks on it, that user will get Trojan Horse program running on your system, and it can erase all of his data from his hard disk, send credit numbers and passwords to a stranger. A Trojan horse is a program, not a virus. It infects your computer and allows a hacker to get control over your computer. If your computer is infected, then it will be controlled totally by a hacker. Mostly home users are much targets of Trojan Horse programs because all other official organization and bank take care of this security in advance and keep a secure policy to prevent this type of attack.
How Trojan Programs are spread: Trojans Programs are spread in many ways such as email attachments, in chat room by sending files, and files placed on sites using fake names of games to download. Or they join a Trojan program file in a legitimate file and when you run it, you are aware of it, but a Trojan Program is installed in background and now it is sitting and waiting for hackers to connect and get control over your computer. When this program is executed, then Hacker will know that their victim is online and they have chances to do anything they want. Now Hackers will scan computers that are infected by Trojan Horse Program. They will get a list of cached

You May Also Find These Documents Helpful

  • Satisfactory Essays

    14) What term describes a malicious software program that users are tricked into running? A) Trojan horse…

    • 284 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    |Trojan horse - A virus that allows a backdoor into a computer affecting the computer without the users knowledge and allows the information stored |…

    • 829 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    NT 2580 Project Part 2

    • 2096 Words
    • 9 Pages

    Issue three. Based on the premise that there is a mix of computer running Windows 2000, Windows XP, Windows Vista, Windows 7, and Mac OS X, you must research and devise a plan to thwart malicious code and activity by implementing countermeasures and prevention techniques for dealing with viruses, worms, logic bombs, Trojan horses, and other related forms of intentionally created deviant code.…

    • 2096 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1330 Unit 1

    • 345 Words
    • 2 Pages

    And once malwares, Trojans, viruses gain entry into the computer system then these software programs destabilize the operating system, cause damage to it. It is recommended to install and use effective PWS: Win32/QQpass.GR removal software like VSKsoft antivirus software to get rid of all malware related issues.…

    • 345 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    unit 7 lab 10

    • 595 Words
    • 3 Pages

    2. Trojan horse was a program that was supposed to find and destroy computer viruses. A Trojan horse may be widely redistributed as part of a computer virus. Email attachments are a way for a sender to transmit files to another user via email. In a similar way to junk mail coming in your door at home, email users regularly receive unsolicited emails from unknown senders. These emails can often contain links to malicious web sites or have attachments containing malicious software. A drive-by download is when a malicious web site you visit downloads and installs software without your knowledge. The objective of drive-by downloads is usually to install malware to record what you type and what sites you visit, to search your computer for stored passwords, or to open your computer to remote control.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Trojan horse – A type of malware that cannot self-replicate, and appears to do one action, but instead infects the computer with malicious payloads.…

    • 437 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    Malicious software, referred to as malware, can contain a variety of threats, from data loss to system failures. There are several types of worms, viruses, Trojan horses and spyware, which can be delivered in a variety of ways. Computer viruses are a type of software or executable file that attaches itself to other programs to be uses. Viruses can cause system failures, rewrite hard drives, or destroy files and programs. Worms are similar to viruses, but are independent programs, rather that attaching to others. Viruses have a tendency to spread more rapidly over networks and through e-mail. Trojan horses are based off their namesake, in which they appear to benign types of programs, but when executed can introduce malware into your system. Spyware is programing that can track computer use. Forms of…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    4. It is a program in which malicious or harmful code is disguised inside some apparently harmless programming or data.…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    * This is a program which appears to be useful, what you cannot see is that the program opens your computer to users on the internet to be used maliciously. Most of the time Trojan viruses are used to turn your computer into a bot to maliciously attack more computers on the internet or in your network by spreading the same file.…

    • 669 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Chipopo Research Paper

    • 343 Words
    • 2 Pages

    When a computer get infected with this virus, the computer screen will be flooded with various unexpected advertisements which can prevent a user from surfing on the Internet normally.The group of hackers created this adware to earn quick money by creating online traffic through which they can generate pay-per-click and marketing revenue.…

    • 343 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    When it comes to viruses and the types that get put onto your computer there are many of them. For example: the Trojan Horse, it is put into your computer by saying it is good for file converting or cleaning a system out, when it is really putting bad programs into your computer along with spyware and other potentially harmful programs. Just like when you go into your email and you see an…

    • 783 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    progress check 1

    • 711 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 711 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Trojan War Research Paper

    • 5157 Words
    • 21 Pages

    The Trojan War pitted a loose alliance of independent Greek kings against the city of *Troy (in what today is northwest Turkey) and her allies in Asia Minor. It is said to have begun with an insult to the goddess Eris ("Strife" or "Discord"). When the Greek hero *Peleus married the minor sea-goddess *Thetis, all of the gods were invited to the wedding except Eris. Angry at this, she placed on the banquet table a golden apple inscribed with the words: "For the fairest." Immediately strife broke out between the various goddesses at the wedding, all of whom claimed the apple for themselves. (Today we still refer to the *Apple of Discord: does this story remind you of any other famous apples?) Three goddesses were determined to have the best claim: *Hera, sister and wife of *Zeus, queen of the gods, goddess of marriages, and a force to reckon with; *Athena, daughter of Zeus, a powerful warrior goddess associated…

    • 5157 Words
    • 21 Pages
    Better Essays
  • Powerful Essays

    • A COMPUTER VIRUS is a computer program that attaches itself to another computer program (known as the host program) and attempts to spread itself to other computers when files are exchanged. • Creating and disseminating computer viruses is one of the most widespread types of cybercrimes. Tens of thousands of new viruses or modified versions of old viruses are released each year. • Viruses normally attempt to hide within the code of a host program to avoid detection. Viruses, by definition, have a method to spread themselves. • Any computing device such as a smartphone, notebook, netbook, or iPad can be infected with a virus. Even your car, which now contains embedded computer systems, could catch a virus, especially if it connects to the Internet for software updates.…

    • 5495 Words
    • 157 Pages
    Powerful Essays
  • Good Essays

    Causes Of Identity Theft

    • 1108 Words
    • 5 Pages

    Hackers are people who hack into other people’s computers or electronic devices so they can take control over their things. A book titled Net Crimes and Misdemeanors written by J. A. Hitchcock takes us through many different aspects of how people take and control our things. She explains to us “When you’re connected to the internet, your computer is part of a worldwide network and anyone can try to connect to your system. The best way to describe it is by contrasting it to your television, a one-way communication mechanism” (Hitchcock 237). Hackers can reach any personal information located on an individual’s computer. Any accounts or credit card numbers in the system, they can get ahold of. We use many internet softwares today that can help prevent hackers, but not all the time. Hackers are extremely knowledgeable with computers and can find their way in. Hitchcock also gives us a little background information on when many viruses and softwares were introduced. She states, “…there was a good enough market for a security suite that included a personal firewall and antivirus capability. They were right. When NIS was introduced in December 1999, the U.S. retail market for internet security software grew more than 140 percent” (Hitchcock 236). Throughout the years, many software updates came out to help protect people and their information. The problem is that the more…

    • 1108 Words
    • 5 Pages
    Good Essays