Your SlideShare is downloading. ×
Trojan Horse Presentation
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Trojan Horse Presentation

13,173
views

Published on

Published in: Technology

4 Comments
3 Likes
Statistics
Notes
No Downloads
Views
Total Views
13,173
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
619
Comments
4
Likes
3
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1.  
  • 2. Content
    • Definition
    • Types of Trojan Horse
    • Types of Trojan Horse Payloads
    • Process
    • How To Avoid From Be Infected
    • How To Remove
    • Conclusion
    • Reference
  • 3. DEFINITION
    • A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user.
    • A Trojan Horse is a program that installs malicious software while under the guise of doing something else.
  • 4. Types Of Trojan Horse
    • There are two common types of trojan horses:
    • 1.One is ordinary software that has been corrupted by hacker.A
    • cracker inserts malicious code into the program that executes
    • while the program is used.
    • Example : Implementations of weather alerting programs,
    • computer clock setting software and p2p file
    • sharing utilities.
    • 2.Standalone program that masquerades as something else,
    • like a game or image file, in order to trick the user into running
    • the program.
  • 5. Type Of Trojan Horse payloads
    • There are two types of Trojan Horse :
    • -Time Bomb and Logic Bomb
    • -Droppers
  • 6. Process
    • Time Bomb activate on particular dates and times.
    • Logic Bomb activate on certain condition met by computer.
    • Droppers perform two tasks at once. A dropper form a legitimate but also installs a computer virus or a computer worm on a system or disk at the same time.
  • 7. How To Avoid From Be Infected
    • Do not download anything from the stranger website.
    • Do not surf to the unknown website.
    • Do not open the unexpected attachments on emails
  • 8. How To Remove
    • Use the following tools :
    • The program is called smitfraudfix http://siri.geekstogo.com/SmitfraudFix.php
    • Just follow the instruction there
    • Download Grisoft Avg 7.5 Anti-Virus, Anti-Malware.Free edition
    • http://free.grisoft.com/doc/5390/lng/us/...
  • 9. Conclusion
    • We need to be careful when download something. We also need an anti-virus to protect our computer from be infected by virus.
    • We need to be a smart user because this can help us from be tricked with nice thing but behind the scenes it infects our computer with a Trojan or Worm.
  • 10. Reference
    • http://au.answers.yahoo.com/question/index?qid=20070515130138AAlllwf
    • http://en.wikipedia.org/wiki/Trojan_horse_(computing)

×