A Trojan horse, often shortened to Trojan, is a type
of malware designed to provide unauthorized, remote access to a user’s
computer. Trojan horses do not have the ability to replicate themselves like
viruses; however, they can lead to viruses being installed on a machine since
they allow the computer to be controlled by the Trojan creator.
The term gets its
name from the Greek story of the Trojan War, when the Greeks offered the
Trojans a peace offering in the form of a large wooden horse.
However, once the Trojans wheeled the horse behind
their closed gates and night fell, the soldiers hidden inside the horse climbed
out and opened the city gates, allowing the Greek army to infiltrate Troy and
capture the city. Trojan horse software operates the same way, where Troy is
your computer and the horse is the benign-seeming application.
Trojan horses
can assist an attacker into turning a user’s computer into a zombie computer,
stealing various data such as credit card information, installing more malware,
key logging and various other malicious activities.
Also, it is
possible for other crackers to control the compromised computer simply by
searching for computers on a network use a port scanner and finding ones that
have already been infected with a Trojan horse. Trojan horses continue to
increase in popularity and currently account for the majority of known malware
found on the web.
Normal computer virus and a Trojan horse is that it is
not specifically developed for spreading themselves.
In its place Trojan horse
virus is downloaded either as an infected file from internet, or as payload of
some other virus. This virus is capable of stealing end-user information and
downloading other malware to a computer too. To fight with this treacherous
virus, your computer is equipped with firewall and you can also install
antivirus software in your system.
In computing, Trojan horse, or Trojan, is any
malicious computer program which is used to hack into a computer by misleading
users of its true intent. The term is derived from the Ancient Greek story of
the wooden horse that was used to help Greek troops invade the city of Troy by
stealth.
However, an antivirus is not always effective against
Trojan horse, so at that instance the way out of the problem is to remove
Trojan horse virus manually.
No comments:
Post a Comment