6 May 2016

what is Trojan horse virus?

A Trojan horse, often shortened to Trojan, is a type of malware designed to provide unauthorized, remote access to a user’s computer. Trojan horses do not have the ability to replicate themselves like viruses; however, they can lead to viruses being installed on a machine since they allow the computer to be controlled by the Trojan creator. 

The term gets its name from the Greek story of the Trojan War, when the Greeks offered the Trojans a peace offering in the form of a large wooden horse.
However, once the Trojans wheeled the horse behind their closed gates and night fell, the soldiers hidden inside the horse climbed out and opened the city gates, allowing the Greek army to infiltrate Troy and capture the city. Trojan horse software operates the same way, where Troy is your computer and the horse is the benign-seeming application. 

Trojan horses can assist an attacker into turning a user’s computer into a zombie computer, stealing various data such as credit card information, installing more malware, key logging and various other malicious activities.

 Also, it is possible for other crackers to control the compromised computer simply by searching for computers on a network use a port scanner and finding ones that have already been infected with a Trojan horse. Trojan horses continue to increase in popularity and currently account for the majority of known malware found on the web.
Normal computer virus and a Trojan horse is that it is not specifically developed for spreading themselves. 

In its place Trojan horse virus is downloaded either as an infected file from internet, or as payload of some other virus. This virus is capable of stealing end-user information and downloading other malware to a computer too. To fight with this treacherous virus, your computer is equipped with firewall and you can also install antivirus software in your system.

In computing, Trojan horse, or Trojan, is any malicious computer program which is used to hack into a computer by misleading users of its true intent. The term is derived from the Ancient Greek story of the wooden horse that was used to help Greek troops invade the city of Troy by stealth.

However, an antivirus is not always effective against Trojan horse, so at that instance the way out of the problem is to remove Trojan horse virus manually.



No comments:

Post a Comment