Trojan Horse Presentation

20,038 views

Published on

Published in: Technology
4 Comments
10 Likes
Statistics
Notes
No Downloads
Views
Total views
20,038
On SlideShare
0
From Embeds
0
Number of Embeds
163
Actions
Shares
0
Downloads
1,272
Comments
4
Likes
10
Embeds 0
No embeds

No notes for slide

Trojan Horse Presentation

  1. 2. Content <ul><li>Definition </li></ul><ul><li>Types of Trojan Horse </li></ul><ul><li>Types of Trojan Horse Payloads </li></ul><ul><li>Process </li></ul><ul><li>How To Avoid From Be Infected </li></ul><ul><li>How To Remove </li></ul><ul><li>Conclusion </li></ul><ul><li>Reference </li></ul>
  2. 3. DEFINITION <ul><li>A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. </li></ul><ul><li>A Trojan Horse is a program that installs malicious software while under the guise of doing something else. </li></ul>
  3. 4. Types Of Trojan Horse <ul><li>There are two common types of trojan horses: </li></ul><ul><li>1.One is ordinary software that has been corrupted by hacker.A </li></ul><ul><li> cracker inserts malicious code into the program that executes </li></ul><ul><li> while the program is used. </li></ul><ul><li>Example : Implementations of weather alerting programs, </li></ul><ul><li>computer clock setting software and p2p file </li></ul><ul><li>sharing utilities. </li></ul><ul><li>2.Standalone program that masquerades as something else, </li></ul><ul><li> like a game or image file, in order to trick the user into running </li></ul><ul><li> the program. </li></ul>
  4. 5. Type Of Trojan Horse payloads <ul><li>There are two types of Trojan Horse : </li></ul><ul><li>-Time Bomb and Logic Bomb </li></ul><ul><li>-Droppers </li></ul>
  5. 6. Process <ul><li>Time Bomb activate on particular dates and times. </li></ul><ul><li>Logic Bomb activate on certain condition met by computer. </li></ul><ul><li>Droppers perform two tasks at once. A dropper form a legitimate but also installs a computer virus or a computer worm on a system or disk at the same time. </li></ul>
  6. 7. How To Avoid From Be Infected <ul><li>Do not download anything from the stranger website. </li></ul><ul><li>Do not surf to the unknown website. </li></ul><ul><li>Do not open the unexpected attachments on emails </li></ul>
  7. 8. How To Remove <ul><li>Use the following tools : </li></ul><ul><li>The program is called smitfraudfix http://siri.geekstogo.com/SmitfraudFix.php </li></ul><ul><li> Just follow the instruction there </li></ul><ul><li>Download Grisoft Avg 7.5 Anti-Virus, Anti-Malware.Free edition </li></ul><ul><li>http://free.grisoft.com/doc/5390/lng/us/... </li></ul>
  8. 9. Conclusion <ul><li>We need to be careful when download something. We also need an anti-virus to protect our computer from be infected by virus. </li></ul><ul><li>We need to be a smart user because this can help us from be tricked with nice thing but behind the scenes it infects our computer with a Trojan or Worm. </li></ul>
  9. 10. Reference <ul><li>http://au.answers.yahoo.com/question/index?qid=20070515130138AAlllwf </li></ul><ul><li>http://en.wikipedia.org/wiki/Trojan_horse_(computing) </li></ul>

×