Trojan Horse

Izvor: KiWi

Inačica od 03:01, 31. siječnja 2014. koju je unio/unijela Carolynn521tt (Razgovor | doprinosi)
(razl) ←Starija inačica | vidi trenutačnu inačicu (razl) | Novija inačica→ (razl)
Skoči na: orijentacija, traži

Trojan Horse

The original trojan horse was built by Odysseus, the King of Ithica, during the legendary Trojan Wars. The Greeks were losing the siege of the city of Troy. Learn more about Modular Home Prices by visiting our grand essay. Odysseus had a big wooden horse built and left as a "gift" outside the walls of the city of Troy. He then ordered the Greek army to sail away.

The Trojans believed the horse to be a peace providing from Odysseus. Rather, the horse was filled with Greek warriors, such as Odysseus and Menelaus. As the Trojans slept, the Greek army sailed back to Troy and the soldiers hiding in the wooden horse snuck out and opened the gates of the city for them.

The Laptop or computer Trojan Horse

A pc trojan horse is a program which appears to be some thing very good, but truly conceals some thing bad.

One particular way to spread a trojan horse is to hide it inside a distribution of normal computer software. In 2002, the sendmail and OpenSSH packages were both utilized to hide trojan horses. This was done by an attacker who broke into the distribution web sites for these software program packages and replaced the original distributions with his personal packages.

A more frequent strategy of spreading a trojan horse is to send it by way of e-mail. The attacker will send the victim an e-mail with an attachment known as one thing like "prettygirls.exe." When the victim opens the attachment to see the quite girls, the trojan horse will infect his system.

A equivalent strategy for spreading trojan horses is to send files to unsuspecting customers over chat systems like IRC, AIM, ICQ, MSN, or Yahoo Messenger.

The Trojan Horses Virus

Unlike viruses, trojan horses do not usually spread themselves. Trojan horses have to be spread by other mechanisms.

A trojan horse virus is a virus which spreads by fooling an unsuspecting user into executing it.

An instance of a trojan horse virus would be a virus which needed a user to open an e-mail attachment in Microsoft Outlook to activate. Once activated, the trojan horse virus would send copies of itself to people in the Microsoft Outlook address book.

The trojan horse virus infects like a trojan horse, but spreads like a virus.

Effects of a Trojan Horse

The victim running the trojan horse will usually give the attacker some degree of control over the victim's machine. This manage may possibly permit the attacker to remotely access the victim's machine, or to run commands with all of the victim's privileges.

The trojan horse could make the victim's machine portion of a Distributed Denial of Service (DDoS) network, where the victims machine is utilised to attack other victims.

Alternatively, the trojan horse could just send information to the attacker. Information generally targeted by trojan horses includes usernames and passwords, but a sophisticated trojan horse could also be programmed to look for items such as credit card numbers.

Safeguarding Against a Trojan Horse

Anti-virus programs detect recognized trojan horses. However, trojan horse programs are easier to generate than viruses and several are developed in tiny volumes. These trojan horse programs will not be detected by anti-virus computer software.

The best defense against a trojan horse is to in no way run a plan that is sent to you. E-mail and chat systems are not secure strategies of software distribution.

Spyware and adware

A lot of men and women contemplate spyware and adware to be forms of a trojan horse.

Spyware applications carry out a valuable function, and also set up a system that monitors usage of the victim's computer for the objective of advertising to the user.

Adware applications are similiar to spyware programs, except the added software they install shows advertising messages directly to the user.

Osobni alati