Trojan Horse Virus


Published on

video nie ak publish lpas ak wat presentati0n it kat sk0la..huhuhu=P

Published in: Education
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Trojan Horse Virus

  1. 1. Trojan Horse Virus Siti Nur Syafiqah bt. Mat Noor 4 Nilam 2009
  2. 2. Presentation Objective <ul><li>At the end of the presentation, you will understand </li></ul><ul><li>What is a Trojan horse? </li></ul><ul><li>Types of Trojan Horse ? </li></ul><ul><li>How do we avoid getting infected in the future? </li></ul><ul><li>How do we get rid of trojans?!? </li></ul>
  3. 3. Trojan Horse a program that installs malicious software while under the guise of doing something else. malicious code that is well disguised and claims to be a useful program or legitimate software. pose as useful programs but contain hidden commands. does things to the user’s computer that the user does not want or intend computer threats that perform a desirable function but in fact performs undisclosed malicious functions that allow unauthorized access to the host machine.
  4. 4. Types of Trojan Horse Trojan Horse A useful software program that is corrupted by hacker and cracker inserts malicious code into the program that executes while the program is used. Act as key loggers that send what all you are typing to an outside system.
  5. 5. How do we avoid from getting infected? <ul><li>NEVER download anything from people or sites which you were not 100% sure about it. </li></ul><ul><li>You must be sure what the file is before opening it, because many trojans will automatically try to spread themselves to friends in an email address book or on an IRC channel. </li></ul><ul><li>Beware of hidden file extensions! To reduce the chances of being tricked, unhide those troublesome extensions . </li></ul><ul><li>NEVER use features in your programs that automatically get or preview files. </li></ul>
  6. 6. How do we remove Trojans?!? <ul><li>You can restore your computer </li></ul><ul><li>Try optimizing Internet Explorer Browser </li></ul><ul><li>Downloading anti-virus software </li></ul><ul><li>Use the following tools: </li></ul><ul><li>The program is called smitfraudfix -- Just follow the instruction there then do an Online ewido scan Just remove all those infections </li></ul>
  7. 7. Conclusion <ul><li>We need to be careful when download something. We also need an anti-virus to protect our computer from be infected by virus. </li></ul><ul><li>We need to be a smart user because this can help us from be tricked with nice thing but behind the scenes it infects our computer with a Trojan or Worm. </li></ul>
  8. 8. References <ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul>
  9. 9. Group Members <ul><li>Najihah bt Ismit </li></ul><ul><li>Fatin Hazwani bt. Dul Fatthah </li></ul><ul><li>Jothi Letchumy a/p P.Mahendra Kumar </li></ul><ul><li>Muna bt. Osman </li></ul><ul><li>Eunice Quah Xuet - Wyne </li></ul><ul><li>Thum Jing Yee </li></ul><ul><li>Mah Sok Wan </li></ul><ul><li>Keethanjeli a/p Kaliyapan </li></ul><ul><li>Elil Bharati a/p Sangga </li></ul><ul><li>Priyatharusini </li></ul><ul><li>Mas Ewani bt. Mohd. Yusoff </li></ul><ul><li>Anastasia bt. Mohd Shah Nizam Sherman </li></ul><ul><li>Azhani bt Azizi </li></ul>