Information systems

  • Beranda
  • Blogging
    • Template
    • Blogging
  • Downloads
    • Software
    • Game
  • Blogging
  • Template
  • SSH Gratis
Home → Tanpa Kategori → trojan horse virus

trojan horse virus

Add Comment
Minggu, 24 Juli 2011
Trojan Horse Viruses, Not A Myth


Most people are familiar with the legend of the Trojan horse. During the siege of Troy, the Greeks left a large wooden horse outside the gates, allegedly as a peace offering. The Trojans brought the horse inside the city walls only to discover it was full of Greek soldiers who quickly sacked the city.

A computer Trojan horse is similar. It looks like a benign or useful program but actually contains hidden code that can destroy data or install spyware.

A Trojan horse is often referred to as a virus, but unlike a true computer virus doesn't replicate itself. It's simply designed to gain access to your system and wreak havoc - like the mythical Greek soldiers.

Many Trojan horses (or simply 'Trojans') are spyware, used to monitor your computer activity and send information to a third party without your knowledge or consent.

Spyware can be used to deliver unsolicited pop-up ads, or to log private information such as credit card numbers and passwords, or even reroute your browser to a commercial site. The unscrupulous vendor at that site usually paid the spyware creator to do just that.

Another common use for a Trojan is to install a 'backdoor' - an access point to your computer which bypasses the normal login procedure. Hackers use backdoors to gain control of your computer to send spam or to wreak malicious damage. Since the damage appears to originate from your system it can be hard to combat.

Geeks make a distinction between 'crackers' who gain access to a system to do harm, and 'hackers' who just want to understand the details of how a system works. We'll stick with the more common, though less accurate, term.

How Trojans Are Distributed

Trojans are hidden in programs which appear useful. You visit a free utility site, download one and run the program. Your system is infected.

They can also be spread by e-mail attachments. If the attachment contains an executable file, that program can also contain a Trojan which will infect your computer as soon as it is run.

Executable files have extensions such as .exe but sometimes the extensions are hidden to make the file look like a harmless text file. An example of this would be a file named 'look_at_me.txt.exe. The user may not notice the '.exe' part of the filename (the extension) and think it's a text file. Some operating systems allow users to hide extensions, so in this case the user would simply see 'look_at_me.txt'. 

Newer tactics involve embedding them in certain image files. The lesson is: never open a file from someone unknown, or when its arrival is unexpected. Even well-meaning individuals pass on viruses this way.

It's common for Trojans to be spread through operating system vulnerabilities. An operating system controls the basic functions of the computer. Computers connect to the Internet through 'ports', some of which present security risks. Malware takes advantage of these vulnerabilities.

One well-known Trojan is called Sub7. Some claim it has legitimate uses (such as remotely controlling your own computer), though it's often used for illegal activities. Computers with Sub7 installed are accessible from a remote location and can be used to steal credit card numbers by logging keystrokes for example.

Fighting Trojans - The modern way

Most antivirus software will detect and remove Trojans. Keep your virus database up to date to provide the best protection. Some antivirus programs require you to manually scan attachments or other incoming files. Get one that does it automatically. The cost difference is negligible.

Always use caution when opening email attachments, even if they come from a known source. If the attachment is unexpected it should be suspected.

Firewalls should also be used to close vulnerabilities when using the Internet.

Share this article :
Tweet
✚

Gunakanlah komentar dengan sebaiknya jangan membuat spam, mohon maaf jika ada komentar anda yang tidak kami publish

Posting Lebih Baru
Posting Lama
Beranda
Langganan: Posting Komentar (Atom)
  • Beranda
  • Sitemap
  • cara aktivasi windows vista

Translate

gampang banget cari duit disini Buruan... Daftar!!!

Entri Populer

  • gps location search
  • bengkel windows xp
  • only 10 day get $6.25
  • cara mendapatkan pulsa gratis
  • gps system
  • gps navigator
  • GPS for compass
  • cara maksimalkan koneksi smartfren sobat google
  • lowongan kerja di pertamina desember
  • the workings of GPS network

Label

  • android (2)
  • Bengkel Windows (24)
  • Cari dolar tanpa modal (1)
  • Cari duit di blog (17)
  • Free Seo (20)
  • GPS (17)
  • Information (18)
  • Lowongan Kerja (11)
  • obat (2)
  • Smartfren Tips Trik (12)
  • Software (52)
  • Tips And Trick (43)

Arsip Blog

  • ►  2014 (1)
    • ►  Oktober (1)
  • ►  2013 (13)
    • ►  Mei (1)
    • ►  April (1)
    • ►  Maret (5)
    • ►  Februari (6)
  • ►  2012 (66)
    • ►  November (1)
    • ►  Juli (2)
    • ►  Juni (27)
    • ►  Mei (15)
    • ►  April (6)
    • ►  Maret (7)
    • ►  Februari (3)
    • ►  Januari (5)
  • ▼  2011 (215)
    • ►  Desember (47)
    • ►  November (23)
    • ►  Oktober (2)
    • ►  September (2)
    • ►  Agustus (28)
    • ▼  Juli (55)
      • many blog visitors
      • back to seo
      • get the rank these day
      • seo down
      • trick keyword
      • adsense formula
      • make money with google adsense
      • succeeding with adsense
      • protecting your pc
      • preventing password hackers
      • my computer is attack
      • What To Do If Your Computer Is Attacked
      • keep children safe online
      • how to avoid by adware and spaware
      • how to protect your computer
      • be fair
      • Strand And STORIES FOR A WORD MEANING And BENEFITS
      • love story Peter and Tina Peter
      • TIPS TO BE HAPPY MOST WOMEN
      • i want to be loved because of GOD
      • beautiful woman when
      • i love you mother
      • syurga expert women and its characteristics
      • reflections of life
      • virus function
      • what is spam
      • virus hoaxes
      • trojan horse virus
      • worm virus
      • fight virues
      • what is a virus computer
      • control spyware infection
      • the best password
      • How To Block Pop-Up In Your PC
      • How To Protect Yourself
      • How To Avoid Keyloggers
      • How To Keep Your PC Healthy
      • How To Password-Protect Documents
      • How To Get Rid Of Computer Viruses: A Step By Step...
      • The Full Adsense Formula Adsense is the best incom...
      • How To Make Money With Google ADSense
      • Succeeding With AdSense Is More Than Just A Fantasy
      • How To Install Games From The Internet Onto Your PSP
      • software cari chord otomatis
      • smadav 8.6 full
      • dijual murah mercy e230
      • source code translate google
      • approve in google adsense
      • learning forex trading online
      • Increase Blog Traffic
      • 2 Best Promotion Techniques, SEO or PPC
      • Tips Securing Email Address
      • Food for pregnant women
      • Let's make the web faster
      • merge subtitle into movie
    • ►  Juni (13)
    • ►  Mei (16)
    • ►  April (2)
    • ►  Maret (2)
    • ►  Februari (18)
    • ►  Januari (7)
  • ►  2010 (54)
    • ►  Desember (19)
    • ►  November (15)
    • ►  Juni (8)
    • ►  April (2)
    • ►  Februari (5)
    • ►  Januari (5)
  • ►  2009 (10)
    • ►  November (10)

Tags

Copyright 2014 Information systems
Template By Ridwan Hex And Game Gratis