Results 1 to 5 of 5

Thread: Want information about Trojan horse

  1. #1
    Join Date
    Aug 2008
    Posts
    94

    Want information about Trojan horse

    Hi friends

    I want some information about Trojan horse ?

  2. #2
    Join Date
    May 2008
    Posts
    181
    Trojan horse attacks pose one of the most serious threats to computer security. If you were referred here, you may have not only been attacked but may also be attacking others unknowingly. This page will teach you how to avoid falling prey to them, and how to repair the damage if you already did. According to legend, the Greeks won the Trojan war by hiding in a huge, hollow wooden horse to sneak into the fortified city of Troy. In today's computer world, a Trojan horse is defined as a "malicious, security-breaking program that is disguised as something benign". For example, you download what appears to be a movie or music file, but when you click on it, you unleash a dangerous program that erases your disk, sends your credit card numbers and passwords to a stranger, or lets that stranger hijack your computer to commit illegal denial of service attacks like those that have virtually crippled the DALnet IRC network for months on end.

  3. #3
    Join Date
    May 2008
    Posts
    21
    The term comes from the a Greek story of the Trojan War, in which the Greeks give a giant wooden horse to their foes, the Trojans, ostensibly as a peace offering. But after the Trojans drag the horse inside their city walls, Greek soldiers sneak out of the horse's hollow belly and open the city gates, allowing their compatriots to pour in and capture Troy. Trojan horses are broken down in classification based on how they breach systems and the damage they cause.

  4. #4
    Join Date
    May 2008
    Posts
    219
    There are seven main types of Trojan horses :
    • Remote Access Trojans
    • Data Sending Trojans
    • Destructive Trojans
    • Proxy Trojans
    • FTP Trojans
    • security software disabler Trojans
    • denial-of-service attack (DoS) Trojans

  5. #5
    Join Date
    Mar 2008
    Posts
    68
    If you are using either of these Symantec firewall programs, the name that the Trojan Block rule uses to prevent the Trojan from being downloaded onto your computer is different than the name that Norton AntiVirus uses to detect the same threat, if it were actually run on your computer or received in an email.

    Norton Internet Security/Norton Internet Protection will block Trojan horse from being downloaded onto your computer using the Block Rule GateCrasher.

Similar Threads

  1. Trojan Horse generic 16.YKJ
    By Sonam Goenka in forum Networking & Security
    Replies: 4
    Last Post: 09-04-2010, 02:15 PM
  2. How to delete Trojan horse
    By bluemarblez2 in forum Operating Systems
    Replies: 1
    Last Post: 08-09-2009, 10:40 AM
  3. Trojan horse PSW.Banker5.SWG
    By Harper in forum Networking & Security
    Replies: 3
    Last Post: 04-09-2009, 08:11 PM
  4. Trojan Horse Examples
    By Kundanlal in forum Networking & Security
    Replies: 3
    Last Post: 22-08-2009, 09:54 AM
  5. Trojan horse TR/spy.GEN, help
    By Dolla in forum Networking & Security
    Replies: 3
    Last Post: 10-03-2009, 07:44 PM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,715,544,244.83295 seconds with 17 queries