0
Trojan Horse Virus Siti Nur Syafiqah bt. Mat Noor 4 Nilam 2009
Presentation Objective   <ul><li>At the end of the presentation, you will understand </li></ul><ul><li>What is a Trojan ho...
Trojan Horse a program that  installs malicious software while  under the guise  of doing  something else. malicious code ...
Types of Trojan Horse Trojan Horse A useful software program that  is corrupted by hacker  and cracker inserts malicious c...
How do we avoid from getting infected?   <ul><li>NEVER download anything from people or sites which you were not 100% sure...
How do we remove Trojans?!? <ul><li>You can restore your computer </li></ul><ul><li>Try optimizing Internet Explorer Brows...
Conclusion <ul><li>We need to be careful when download something. We also need an anti-virus to protect our computer from ...
References <ul><li>http://antivirus.about.com/b/2006/05/31/whats-a-trojan-horse-virus.htm </li></ul><ul><li>http://www.irc...
Group Members <ul><li>Najihah bt Ismit </li></ul><ul><li>Fatin Hazwani bt. Dul Fatthah </li></ul><ul><li>Jothi Letchumy a/...
Upcoming SlideShare
Loading in...5
×

Trojan Horse Virus

3,390

Published on

video nie ak publish lpas ak wat presentati0n it kat sk0la..huhuhu=P

Published in: Education
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
3,390
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
179
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide

Transcript of "Trojan Horse Virus"

  1. 1. Trojan Horse Virus Siti Nur Syafiqah bt. Mat Noor 4 Nilam 2009
  2. 2. Presentation Objective <ul><li>At the end of the presentation, you will understand </li></ul><ul><li>What is a Trojan horse? </li></ul><ul><li>Types of Trojan Horse ? </li></ul><ul><li>How do we avoid getting infected in the future? </li></ul><ul><li>How do we get rid of trojans?!? </li></ul>
  3. 3. Trojan Horse a program that installs malicious software while under the guise of doing something else. malicious code that is well disguised and claims to be a useful program or legitimate software. pose as useful programs but contain hidden commands. does things to the user’s computer that the user does not want or intend computer threats that perform a desirable function but in fact performs undisclosed malicious functions that allow unauthorized access to the host machine.
  4. 4. Types of Trojan Horse Trojan Horse A useful software program that is corrupted by hacker and cracker inserts malicious code into the program that executes while the program is used. Act as key loggers that send what all you are typing to an outside system.
  5. 5. How do we avoid from getting infected? <ul><li>NEVER download anything from people or sites which you were not 100% sure about it. </li></ul><ul><li>You must be sure what the file is before opening it, because many trojans will automatically try to spread themselves to friends in an email address book or on an IRC channel. </li></ul><ul><li>Beware of hidden file extensions! To reduce the chances of being tricked, unhide those troublesome extensions . </li></ul><ul><li>NEVER use features in your programs that automatically get or preview files. </li></ul>
  6. 6. How do we remove Trojans?!? <ul><li>You can restore your computer </li></ul><ul><li>Try optimizing Internet Explorer Browser </li></ul><ul><li>Downloading anti-virus software </li></ul><ul><li>Use the following tools: </li></ul><ul><li>The program is called smitfraudfix http://siri.geekstogo.com/smitfraudfix.p... -- Just follow the instruction there then do an Online ewido scan http://www.ewido.net/en/onlinescan/... Just remove all those infections </li></ul>
  7. 7. Conclusion <ul><li>We need to be careful when download something. We also need an anti-virus to protect our computer from be infected by virus. </li></ul><ul><li>We need to be a smart user because this can help us from be tricked with nice thing but behind the scenes it infects our computer with a Trojan or Worm. </li></ul>
  8. 8. References <ul><li>http://antivirus.about.com/b/2006/05/31/whats-a-trojan-horse-virus.htm </li></ul><ul><li>http://www.irchelp.org/irchelp/security/trojan.html </li></ul><ul><li>http://www.secureurpc.com/secureurpc-articles/trojan-horse-computer-virus.php </li></ul><ul><li>http://www.pcmantra.com/Images/spy-mid.gif </li></ul><ul><li>http://www.securitysoftwarezone.com/modules/news/files/trojan-horse.gif </li></ul><ul><li>http://www.intego.com/pix/virusMP3.gif </li></ul><ul><li>http://www.innovonics.com/graphics/weaklink.gif </li></ul><ul><li>http://www.msconsulting.com/images/MSS-Attack.jpg </li></ul><ul><li>www.newscitech.com </li></ul><ul><li>http://au.answers.yahoo.com/question/index?qid=20070515130138AAlllwf </li></ul>
  9. 9. Group Members <ul><li>Najihah bt Ismit </li></ul><ul><li>Fatin Hazwani bt. Dul Fatthah </li></ul><ul><li>Jothi Letchumy a/p P.Mahendra Kumar </li></ul><ul><li>Muna bt. Osman </li></ul><ul><li>Eunice Quah Xuet - Wyne </li></ul><ul><li>Thum Jing Yee </li></ul><ul><li>Mah Sok Wan </li></ul><ul><li>Keethanjeli a/p Kaliyapan </li></ul><ul><li>Elil Bharati a/p Sangga </li></ul><ul><li>Priyatharusini </li></ul><ul><li>Mas Ewani bt. Mohd. Yusoff </li></ul><ul><li>Anastasia bt. Mohd Shah Nizam Sherman </li></ul><ul><li>Azhani bt Azizi </li></ul>
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×