Skip to main content

Trojan horse Malicious Computer Program

Trojan horse Malicious Computer Program



Trojan horse Malicious Computer Program - Trojan horse is a malicious computer program used to achieve unauthorised access into a computer system by misleading the user of its original contents. Trojan horses do not have the ability to replicate themselves like viruses. Trojan horses can help attacker to turn a computer into a zombie and steal various data such as credit card information, installing unwanted software, keylogging and others. The Ransomware attacks (found recently), which restrict access to data until a ransom is paid—are usually carried out using a Trojan only.


What are the destructions caused by Trojan horse?



  1. Block features of antivirus program.

  2. It can destroy all contents in a disk drive.

  3. Spread malware across the network.

  4. It results in data corruptions

  5. It results in Crashing the computer or peripheral device

  6. It can block any installation program

  7. It may spy on user daily activity and sensitive information.



What are the Types of Trojan horse?



  1. Remote Access Trojans

  2. Proxy Trojans

  3. FTP Trojans

  4. Destructive Trojans

  5. Data Sending Trojans

  6. Security Software disabler Trojans

  7. Denial of Service attack Trojans



How Computer protected from Trojans?



  1. Stay away from Questionable sites b. Stay away from pirated materials c. Stay away from dubious links d. Make use of Reliable antivirus are the few steps by which you can protect your computer.



Trojan horse History?


The term gets its name from the Greek story of the Trojan War, when the Greeks offered the Trojans a peace offering in the form of a large wooden horse. However, once the Trojans wheeled the horse behind their closed gates and night fell, the soldiers hidden inside the horse climbed out and opened the city gates, allowing the Greek army to infiltrate Troy and capture the city. Trojan horses can help attacker to turn a computer into a zombie and steal various data such as credit card information, installing unwanted software, keylogging and others. The Ransomware attacks (found recently), which restrict access to data until a ransom is paid—are usually carried out using a Trojan only.

Popular posts from this blog

Fix Windows could not find a driver for your network adapter error

Fix Windows could not find a driver for your network adapter error


A Computer run smoothly with the coordination of Software & Hardware. In the absence of any one it will not run at all. Software being the Master utilizes each hardware attached to the System. And each hardware is operated with the help of Device Drivers installed in it. Operating System (OS) uses these device drivers to control & utilize each hardware when needed. Each hardware connected to the system must have their own Device Driver installed. A device driver is a program to initiate a hardware when required by Operating System.




Suppose, you want your PC to connect to the Network, it can only be possible when your PC has network related Device Driver. These Device Drivers are easily downloaded from Manufacturer Websites. In this article we focus on Network related problem. Suppose, your PC not obtaining Network connectivity. And each time you are getting an error message saying "Windows could not find a d…

Fix This Site Can’t Be Loaded from The Cache Chrome Error

Fix This Site Can't Be Loaded from The Cache Chrome Error


This Site Can’t Be Loaded from The Cache - Today, there are several browsers available with extensive features on it. Each browser has its own importance and working principle. Some of the popular browsers available online are Google Chrome, Mozilla Firefox, Opera Mini, Internet Explorer, UC Browser, Safari, Microsoft Edge, Swift fox etc. The popularity of these browsers depends upon the features available in it.

Among them Google Chrome is the newest and mostly used browser around the world. Holding lots of feature make it more complex and hence more prone to errors. The types of error come up with the level of complexity of the program. If you are Chrome user and facing one of such error then read the full article. In this article, we focus on an error saying "This site can't be loaded from the cache". The explanation included with this error will be "The saved (cached) copy of this site was unreadable&qu…

Change Facebook Profile Picture Leaving All Unknown

Change Facebook Profile Picture Leaving All Unknown


Change Facebook Profile Picture Leaving All Unknown - Today, we spend lots of time in Social media platforms such as WhatsApp, Facebook, Instagram, Skype, YouTube, Twitter etc. We love to share Images & Videos with our friends via these platforms. These applications are largely used on Smartphones. We need to download concerned apps from inbuilt software, Play Store in Android Platform.


After downloading the App, we create an ideal account with a profile picture. We join the network by sending friend request. When request is accepted, we are added to such a community. In this article we take a close look on Facebook. Facebook is vastly used all around the world. Two person residing miles away can also share their views easily.

Change Facebook Profile Picture Leaving All Unknown

Whenever we open Facebook, lots of Images & Videos are seen with gentle scroll. In this article we focus on an interesting thing say Profile Picture. In F…