skip to Main Content

Trojan horse Malicious Computer Program

Trojan horse Malicious Computer Program

Trojan horse Malicious Computer Program – Trojan horse is a malicious computer program used to achieve unauthorised access into a computer system by misleading the user of its original contents. Trojan horses do not have the ability to replicate themselves like viruses. Trojan horses can help attacker to turn a computer into a zombie and steal various data such as credit card information, installing unwanted software, keylogging and others. The Ransomware attacks (found recently), which restrict access to data until a ransom is paid—are usually carried out using a Trojan only.

What are the destructions caused by Trojan horse?

  1. Block features of antivirus program.
  2. It can destroy all contents in a disk drive.
  3. Spread malware across the network.
  4. It results in data corruptions
  5. It results in Crashing the computer or peripheral device
  6. It can block any installation program
  7. It may spy on user daily activity and sensitive information.

What are the Types of Trojan horse?

  1. Remote Access Trojans
  2. Proxy Trojans
  3. FTP Trojans
  4. Destructive Trojans
  5. Data Sending Trojans
  6. Security Software disabler Trojans
  7. Denial of Service attack Trojans

How Computer protected from Trojans?

  1. Stay away from Questionable sites b. Stay away from pirated materials c. Stay away from dubious links d. Make use of Reliable antivirus are the few steps by which you can protect your computer.

Trojan horse History?

The term gets its name from the Greek story of the Trojan War, when the Greeks offered the Trojans a peace offering in the form of a large wooden horse. However, once the Trojans wheeled the horse behind their closed gates and night fell, the soldiers hidden inside the horse climbed out and opened the city gates, allowing the Greek army to infiltrate Troy and capture the city. Trojan horses can help attacker to turn a computer into a zombie and steal various data such as credit card information, installing unwanted software, keylogging and others. The Ransomware attacks (found recently), which restrict access to data until a ransom is paid—are usually carried out using a Trojan only.

Leave a Reply

Back To Top
%d bloggers like this: