Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Trojan ppt pianca


Published on

by Priyanka Daimary

Published in: Education

Trojan ppt pianca

  1. 1. • Definition• Types of Trojan Horse• Types of Trojan Horse Payloads• Process• How To Avoid From Be Infected• How To Remove• Conclusion• Reference
  2. 2. A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. A Trojan Horse is a program that installs malicious software while under the guise of doing something else
  3. 3. One of the earliest Trojan horse viruses wasdetected in the 1980s, when severalcomputers were affected. As it was earliermentioned Trojan horse viruses are createdin order to steal useful information such aspasswords. They are developed by hackers,who, after stealing data, can use theinformation for various purposes, includingblackmailing. Some of the first Trojan horseviruses were able to infectWindows32 files,but since then these programs evolved, andtoday they can cause even more harm.
  4. 4. A Trojan may give a hacker remote access to a targeted computer system. Operations that could be performed by a hacker on a targeted computer system may include: Use of the machine as part of a botnet (e.g. to perform automated spamming or to distribute Denial-of-service attacks) Electronic money theft Data theft (e.g. retrieving passwords or credit card information) Installation of software, including third-party malware Downloading or uploading of files on the users computer Modification or deletion of files Keystroke logging
  5. 5.  There are two common types of Trojan horses: 1.One is ordinary software that has been corrupted by hacker . A cracker inserts malicious code into the program that executes while the program is used. Example : Implementations of weather alerting programs, computer clock setting software and p2p file sharing utilities. 2.Standalone program that masquerades as something else, like a game or image file, in order to trick the user into running the program.
  6. 6.  There are two types of Trojan Horse : -Time Bomb and Logic Bomb -Droppers
  7. 7.  Netbus (by Carl-Fredrik Neikter) Subseven or Sub7(by Mobman) Y3K Remote Administration Tool (by Konstantinos & Evangelos Tselentis) Back Orifice (Sir Dystic) Beast Zeus The Blackhole exploit kit Flashback Trojan (Trojan.BackDoor.Flashback)
  8. 8.  Time Bomb activate on particular dates and times. Logic Bomb activate on certain condition met by computer. Droppers perform two tasks at once. A dropper form a legitimate but also installs a computer virus or a computer worm on a system or disk at the same time.
  9. 9.  Do not download anything from the stranger website. Do not surf to the unknown website. Do not open the unexpected attachments on emails
  10. 10.  Use the following tools : The program is called smitfraudfix Just follow the instruction there Download Grisoft Avg 7.5 Anti-Virus, Anti- Malware . Free edition
  11. 11. FIG. Trojan horse
  12. 12.  We need to be careful when download something. We also need an anti-virus to protect our computer from be infected by virus. We need to be a smart user because this can help us from be tricked with nice thing but behind the scenes it infects our computer with a Trojan or Worm.