Articles Service - Marketing And Unique Articles - Online Directory - Quick Promotion - Free Contents


   

What is a Trojan Horse Virus



[Valid RSS feed]  Category Rss Feed - http://www.look4articles.com/rss.php?rss=268
By : Musarrat Sheikh    99 or more times read
Submitted 2011-02-01 22:29:52
Trojan horse is a term derived from the Trojan horse story in Greek mythology and it is software that appears to perform a desirable function for the user prior to run or install but instead steals information or harms the system. The purposes of this software are various one being Adware where the horse modifies the user's computer to display advertisements in undesirable places like the desktop or in uncontrollable pop ups. In some cases, it can be less notorious such as installing a toolbar on to the user's web browser without notice. This will thereby create revenue for the author of the Trojan despite it being against the terms of service of several internet-advertising networks such as Google Ad Sense. Trojan horse can also be used for security purposes and this is where it allows a hacker to remotely access to a target computer system.
Once a Trojan horse is installed in a target computer system a hacker can access to the computer remotely and perform several operations although they will be limited to the user's privileges on the target computer system as well as the design of the Trojan horse. There are several operations that a hacker can perform on a target computer and this will include:

Keystroke logging.
Crashing the computer.
Watching the user's screen.
Data theft like retrieving passwords or credit card information.
Modification and deletion of files.
Downloading and uploading files on the user's computer.
Installation of software, which will include third party malware.

Usage of the machine as part of a bonnet for example to perform automated spamming or distribute denial of service attacks among other operations.
Trojan horses in these cases will require a hacker's interaction to fulfill their purpose though the hacker need not be the individual responsible for distributing the Trojan horse. Some individual hackers scan computers on a network using a port scanner hoping to find one with a malicious Trojan horse installed where they can use it to control the target computer.

Currently Trojan horse is becoming more popular and this is because of the popularity of bonnets among hackers as well as the availability of advertising services that permit authors to violate their user's privacy. Trojan horse is more like a virus although the main difference is that Trojans spread themselves. Trojan horses disguise themselves as valuable and useful software available for download in several internet web sites where most people will be fooled and end up downloading it. The Trojan horse is typically separated in two parts a server and a client.

The client is cleverly disguised as significant software and also positioned in peer-to-peer file sharing networks or unauthorized download websites. Once the client excites on your computer the attacker who is the person, running the server gets a high level of control over your computer and this is what leads to destructive effects, which will mainly depend on the attacker's main purpose. Trojan horse spreads in a number of ways with most common way being through email attachments. Other will include via chat software's such as Skype and Yahoo Messenger or sending copies of the Trojan horse to people in the address book of an affected computer.

Author Resource:

This article touched the basics of the topic. I have 2 more resources related to the above. They are trojan horse and trojan horse virus . They are worth a read.

Related Articles


HTML Ready Article. Click on the "Copy" button to copy into your clipboard.




Firefox users please select/copy/paste as usual


New Members
select
Sign up
select
Learn more
ASK It!
ASK It!

 
Directory Menu
Home
Login to Directory
Submit Articles
Submission Guidelines
Top Articles
Link Directory
About Us
Articles Directory Advertisement
Articles Directory Advertisement Media Kit
Contact Us
Privacy Policy
RSS Feeds


Categories

Accessories
Advice
Aging
Arts
Arts and Crafts
Automotive
Break-up
Business
Business Management
Cancer Survival
Career
Cars and Trucks
CGI
Cheating
Coding Sites
Computers
Computers and Technology
Cooking
Crafts
Culture
Current Affairs
Databases
Death
Education
Entertainment
Etiquette
Family Concerns
Film
Finances
Food and Drinks
Gardening
Healthy Living
Holidays
Home
Home Management
Internet
Jobs
Leadership
Legal
Medical
Medical Business
Medicines and Remedies
Men Only
Motorcyles
Opinions
Our Pets
Outdoors
Parenting
Pets
Recreation
Relationships
Religion
Self Help
Self Improvement
Society
Sports
Staying Fit
Technology
Travel
Web Design
Weddings
Wellness, Fitness and Di
Women Only
Womens Interest
World Affairs
Writing
 
Actions
Print This Article
Add To Favorites
[Valid RSS feed]

Copyright LOOK 4 ARTICLES FREE DIRECTORY - 2005-2012 - Powered By: HYIP