•   Definition•   Types of Trojan Horse•   Types of Trojan Horse Payloads•   Process•   How To Avoid From Be Infected•   H...
A  computer virus is a computer program that  can copy itself and infect a computer  without permission or knowledge of t...
One of the earliest Trojan horse viruses wasdetected in the 1980s, when severalcomputers were affected. As it was earlierm...
A Trojan may give a hacker remote access to a targeted    computer system. Operations that could be performed by a    hack...
   There are two common types of Trojan horses:    1.One is ordinary software that has been corrupted by    hacker . A   ...
 There are two types of Trojan Horse : -Time Bomb and Logic Bomb -Droppers
 Netbus (by Carl-Fredrik Neikter) Subseven or Sub7(by Mobman) Y3K Remote Administration Tool (by  Konstantinos & Evange...
 Time  Bomb activate on particular dates and  times. Logic Bomb activate on certain condition met  by computer. Dropper...
 Do not download anything from the stranger  website. Do not surf to the unknown website. Do not open the unexpected at...
 Use the following tools : The program is called smitfraudfix  http://siri.geekstogo.com/SmitfraudFix.php   Just follow ...
FIG. Trojan horse
 We  need to be careful when download  something. We also need an anti-virus to  protect our computer from be infected by...
Trojan ppt pianca
Trojan ppt pianca
Trojan ppt pianca
Upcoming SlideShare
Loading in...5
×

Trojan ppt pianca

2,216

Published on

by Priyanka Daimary

Published in: Education
1 Comment
4 Likes
Statistics
Notes
No Downloads
Views
Total Views
2,216
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
1
Likes
4
Embeds 0
No embeds

No notes for slide

Transcript of "Trojan ppt pianca"

  1. 1. • Definition• Types of Trojan Horse• Types of Trojan Horse Payloads• Process• How To Avoid From Be Infected• How To Remove• Conclusion• Reference
  2. 2. A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. A Trojan Horse is a program that installs malicious software while under the guise of doing something else
  3. 3. One of the earliest Trojan horse viruses wasdetected in the 1980s, when severalcomputers were affected. As it was earliermentioned Trojan horse viruses are createdin order to steal useful information such aspasswords. They are developed by hackers,who, after stealing data, can use theinformation for various purposes, includingblackmailing. Some of the first Trojan horseviruses were able to infectWindows32 files,but since then these programs evolved, andtoday they can cause even more harm.
  4. 4. A Trojan may give a hacker remote access to a targeted computer system. Operations that could be performed by a hacker on a targeted computer system may include: Use of the machine as part of a botnet (e.g. to perform automated spamming or to distribute Denial-of-service attacks) Electronic money theft Data theft (e.g. retrieving passwords or credit card information) Installation of software, including third-party malware Downloading or uploading of files on the users computer Modification or deletion of files Keystroke logging
  5. 5.  There are two common types of Trojan horses: 1.One is ordinary software that has been corrupted by hacker . A cracker inserts malicious code into the program that executes while the program is used. Example : Implementations of weather alerting programs, computer clock setting software and p2p file sharing utilities. 2.Standalone program that masquerades as something else, like a game or image file, in order to trick the user into running the program.
  6. 6.  There are two types of Trojan Horse : -Time Bomb and Logic Bomb -Droppers
  7. 7.  Netbus (by Carl-Fredrik Neikter) Subseven or Sub7(by Mobman) Y3K Remote Administration Tool (by Konstantinos & Evangelos Tselentis) Back Orifice (Sir Dystic) Beast Zeus The Blackhole exploit kit Flashback Trojan (Trojan.BackDoor.Flashback)
  8. 8.  Time Bomb activate on particular dates and times. Logic Bomb activate on certain condition met by computer. Droppers perform two tasks at once. A dropper form a legitimate but also installs a computer virus or a computer worm on a system or disk at the same time.
  9. 9.  Do not download anything from the stranger website. Do not surf to the unknown website. Do not open the unexpected attachments on emails
  10. 10.  Use the following tools : The program is called smitfraudfix http://siri.geekstogo.com/SmitfraudFix.php Just follow the instruction there Download Grisoft Avg 7.5 Anti-Virus, Anti- Malware . Free edition http://free.grisoft.com/doc/5390/lng/us/...
  11. 11. FIG. Trojan horse
  12. 12.  We need to be careful when download something. We also need an anti-virus to protect our computer from be infected by virus. We need to be a smart user because this can help us from be tricked with nice thing but behind the scenes it infects our computer with a Trojan or Worm.

×