Go Back   TechArena Community > Technology > Networking & Security
Become a Member!
Forgot your username/password?
Tags Active Topics RSS Search Mark Forums Read

Reply
 
Thread Tools Search this Thread
  #1  
Old 12-12-2011
Member
 
Join Date: Oct 2011
Posts: 91
How does a Trojan horse works

How does a trojan virus works. I had originated a number of detection in the computer. And unexpectedly there are auto generated folders in the system. I desire to be familiar with how does a trojan virus runs and how does the similar enters a computer. Does this are the majority dangerous threats. Fundamentally what are the major defects cause the virus in the system.
Reply With Quote
  #2  
Old 12-12-2011
Member
 
Join Date: Nov 2010
Posts: 442
Re: How does a Trojan horse works

The Trojan horses are one of the majority dangerous forms of malware the user might run across at the same time as surfing the Internet. It is noteworthy with the purpose of they share a small number of distinctions that create it easier to understand just presently how Trojan horses work. The Trojan horses do not self-replicate. This commencing form of malware mimics the functionality of a advantageous program. A Trojan program opens a backdoor to have right of entry to the user?s computer on the system level.
Reply With Quote
  #3  
Old 12-12-2011
Member
 
Join Date: Mar 2011
Posts: 464
Re: How does a Trojan horse works

The urgency to eliminate Trojan horses becomes apparent when the system user understands with the intention of this malware permits a hacker remote to have right of entry to the operating system. A common function of an contaminated computer is its enclosure in a botnet. Hackers turn the apparatus into a zombie computer with the intention of might at present at the hands of a bot herder send out spam emails with the intention of carry a reputable email return address. The diminutive business owners in particular are normally staggered when receiving angry emails or phone calls regarding alleged spam emails their computers sent out.
Reply With Quote
  #4  
Old 12-12-2011
Member
 
Join Date: Mar 2011
Posts: 440
Re: How does a Trojan horse works

Another superior reason for Trojan removal is the hacker?s capability to have right of entry data. Files might be uploaded or downloaded, the user?s screen becomes observable to a third party, supplementary malware might be installed at the hacker?s expediency and keystroke logging assists in stealing to have right of entry codes and responsive data. It is interesting to note with the purpose of the hacker who accesses the user?s system and the creator of the Trojans do not have encompassed to be the similar person. In fact, hackers regularly utilize port scanners to probe network hosts in an effort to locate ports to facilitate have been opened by Trojan malware programs. Even though additional commonly associated through computer worms, port scanners nevertheless offer the similar access for Trojan-infected machines.
Reply With Quote
  #5  
Old 12-12-2011
Member
 
Join Date: May 2011
Posts: 459
Re: How does a Trojan horse works

Following the belief with the intention of an ounce of protection is worth a pound of cure, locating out how Trojan horses work be able to assist slam the door shut on this commencing form of malware. There are frequently four avenues of attack. A hacker utilizes a weak program and take advantage of a security flaw. Messaging programs are disreputable in this context, other than so are browsers and even media players. Updating sanctuary patches mechanically and choosing additional secure programs even if they come by means of a price tag attached saves time and money in the long run.
Reply With Quote
  #6  
Old 15-12-2011
Member
 
Join Date: Feb 2011
Posts: 95
Re: How does a Trojan horse works

The trojan virus in addition commencing from the following. The shareware in general and download sites in meticulous are well-recognized sources of Trojans. Sharing files be supposed to be curtailed as much as probable and downloads be obliged to merely be accepted commencing from trusted sites. This goes hand in hand through the email attachments with the intention of might be hiding this malware. Recurrently these emails commencing from trusted sources, even if they were not sent by them. The odds are superior with the intention of a hacker-controlled botnet sent out emails containing the Trojans.
Reply With Quote
  #7  
Old 15-12-2011
Member
 
Join Date: Dec 2011
Posts: 5
Re: How does a Trojan horse works

Trojan horses are common but dangerous programs that hide within other harmless programs. They work the same way the ancient Trojan horse did: Once they're installed, the program will infect other files throughout your system and potentially wreak havoc on your computer. They can even send important information from your computer over the Internet to the developer of the virus.
Reply With Quote
Reply

  TechArena Community > Technology > Networking & Security
Tags: , , , , ,



Thread Tools Search this Thread
Search this Thread:

Advanced Search


Similar Threads for: "How does a Trojan horse works"
Thread Thread Starter Forum Replies Last Post
Trojan Horse generic 14.wvc Adel123 Networking & Security 3 08-09-2009 05:43 PM
Trojan Horse Generic 12 Tungesh Networking & Security 3 13-08-2009 10:11 PM
Trojan.Horse.PSW.Agent.YOM on new MP3 what to do? aimie077 Networking & Security 4 25-06-2009 10:29 AM
Trojan horse TR/spy.GEN, help Dolla Networking & Security 3 10-03-2009 07:44 PM
Trojan Horse Generic11.ADC Help man-u Networking & Security 6 21-08-2008 02:54 PM


All times are GMT +5.5. The time now is 08:27 AM.