• Definition• Types of Trojan Horse• Types of Trojan Horse Payloads• Process• How To Avoid From Be Infected• How To Remove• Conclusion• Reference
A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. A Trojan Horse is a program that installs malicious software while under the guise of doing something else
One of the earliest Trojan horse viruses wasdetected in the 1980s, when severalcomputers were affected. As it was earliermentioned Trojan horse viruses are createdin order to steal useful information such aspasswords. They are developed by hackers,who, after stealing data, can use theinformation for various purposes, includingblackmailing. Some of the first Trojan horseviruses were able to infectWindows32 files,but since then these programs evolved, andtoday they can cause even more harm.
A Trojan may give a hacker remote access to a targeted computer system. Operations that could be performed by a hacker on a targeted computer system may include: Use of the machine as part of a botnet (e.g. to perform automated spamming or to distribute Denial-of-service attacks) Electronic money theft Data theft (e.g. retrieving passwords or credit card information) Installation of software, including third-party malware Downloading or uploading of files on the users computer Modification or deletion of files Keystroke logging
There are two common types of Trojan horses: 1.One is ordinary software that has been corrupted by hacker . A cracker inserts malicious code into the program that executes while the program is used. Example : Implementations of weather alerting programs, computer clock setting software and p2p file sharing utilities. 2.Standalone program that masquerades as something else, like a game or image file, in order to trick the user into running the program.
There are two types of Trojan Horse : -Time Bomb and Logic Bomb -Droppers
Time Bomb activate on particular dates and times. Logic Bomb activate on certain condition met by computer. Droppers perform two tasks at once. A dropper form a legitimate but also installs a computer virus or a computer worm on a system or disk at the same time.
Do not download anything from the stranger website. Do not surf to the unknown website. Do not open the unexpected attachments on emails
Use the following tools : The program is called smitfraudfix http://siri.geekstogo.com/SmitfraudFix.php Just follow the instruction there Download Grisoft Avg 7.5 Anti-Virus, Anti- Malware . Free edition http://free.grisoft.com/doc/5390/lng/us/...
We need to be careful when download something. We also need an anti-virus to protect our computer from be infected by virus. We need to be a smart user because this can help us from be tricked with nice thing but behind the scenes it infects our computer with a Trojan or Worm.