Trojan Horse

Topics: Computer, Hacker, Password Pages: 3 (1102 words) Published: April 25, 2013
Trojan Horse - A Definition
A Trojan horse is a program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage, such as ruining the file allocation table on your hard disk. Trojan Horse Detailed..

Trojan Horse Program is one of the today’s most serious threats to computer security. This program not only effects a user’s computer, but that user can also infect and attack others system unknowingly. In today’s computer world, a Trojan Horse program is defined as “ malicious, security-breaking program that is disguised as something benign”. For example, a user download a file that appears to be a movie or song, but when he clicks on it, that user will get Trojan Horse program running on your system, and it can erase all of his data from his hard disk, send credit numbers and passwords to a stranger. A Trojan horse is a program, not a virus. It infects your computer and allows a hacker to get control over your computer. If your computer is infected, then it will be controlled totally by a hacker. Mostly home users are much targets of Trojan Horse programs because all other official organization and bank take care of this security in advance and keep a secure policy to prevent this type of attack. How Trojan Programs are spread: Trojans Programs are spread in many ways such as email attachments, in chat room by sending files, and files placed on sites using fake names of games to download. Or they join a Trojan program file in a legitimate file and when you run it, you are aware of it, but a Trojan Program is installed in background and now it is sitting and waiting for hackers to connect and get control over your computer. When this program is executed, then Hacker will know that their victim is online and they have chances to do anything they want. Now Hackers will scan computers that are infected by Trojan Horse Program. They will get a list of cached...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • What Worms and Trojan Horses Are Essay
  • Trojan Horse and Assessment Worksheet Essay
  • Trojan Virus Essay
  • Malware and Virus Protection
  • Essay about Viruses, Trojan Horses and Worms Can Be the Cause of Damage to a Computer System – Are People Who Generate Them Breaking the...
  • Trojan Horse Essay
  • Worms and Trojan Horses Essay
  • Sales and Trojan Horse Essay

Become a StudyMode Member

Sign Up - It's Free