blog




  • Essay / Trojan horse and Trojan virus - 1262

    Trojan horse and Trojan virus. Today, people know “Trojan” or “Malware” as a computer virus. Trojans falsely present themselves as useful and valuable software to download from the Internet. People are tricked by the Trojan because it can portray itself as an application that can be useful on your computer and then people end up downloading them. But before that happens, did you know that the Trojan itself is not dangerous at all, it is just a vessel on which other harmful applications can attach themselves. A Trojan virus can spread in many ways. The most common are email, "the other is using chat software such as Microsoft Messenger and Skype." (Sourced from Topbits.com, Tech Community) or by copying yourself to others via your computer's email addresses. Many Trojan viruses have been developed with a remarkable degree of intelligence, with some being able to completely control the victim's computer, send a saved password from the victim to the Trojan sender, or allow it to destroy and delete files from the victim's computer. Meanwhile, a Remote Access Trojan occurs when the attacker can take full control of the victim's computer, provide access to the victim's files, and gain access to all personal data such as 'a passport number, a credit card number, and the attacker can also enter the main core secretly. of the operating system and steal files or change settings. Soon, when this program is active, the computer can be run by another user elsewhere. One way information is transferred is by recording keyboard commands. The data is recorded and sent via Internet protocol. The remote user can then manipulate the system. “When the system is manipulated, the attacker will have a clone of your computer screen. What you received, ...... middle of paper ...... each individual software. And the Trojan Horse of the Trojan War, the plan could fail if the Trojans decide not to bring the horse inside or if they know the horse is a trap. Works Cited Carr, Karen. “KIDIPED.” The Trojan horse. Karen Carr, January 15, 2009. Web. May 16, 2010. Lo, Joseph. “Attack of the Trojan horse.” Trojan horse. Np, February 6, 2006. Web. May 16, 2010. .Powell, Barry. "The Trojan War". Deadly Women of the Trojan War. New Jersey: Prentice Hall, nd Web. May 16, 2010. ""Trojan Horse Virus." Trojan Horse Virus. Meme Bridge, nd Web. May 16, 2010. .Trojan Horse Virus." TopBit.com. Np, and Web. May 16 2010. .