Results 1 to 7 of 7

Thread: How does a Trojan horse works

  1. #1
    Join Date
    Oct 2011
    Posts
    91

    How does a Trojan horse works

    How does a trojan virus works. I had originated a number of detection in the computer. And unexpectedly there are auto generated folders in the system. I desire to be familiar with how does a trojan virus runs and how does the similar enters a computer. Does this are the majority dangerous threats. Fundamentally what are the major defects cause the virus in the system.

  2. #2
    Join Date
    Nov 2010
    Posts
    445

    Re: How does a Trojan horse works

    The Trojan horses are one of the majority dangerous forms of malware the user might run across at the same time as surfing the Internet. It is noteworthy with the purpose of they share a small number of distinctions that create it easier to understand just presently how Trojan horses work. The Trojan horses do not self-replicate. This commencing form of malware mimics the functionality of a advantageous program. A Trojan program opens a backdoor to have right of entry to the user’s computer on the system level.

  3. #3
    Join Date
    Mar 2011
    Posts
    466

    Re: How does a Trojan horse works

    The urgency to eliminate Trojan horses becomes apparent when the system user understands with the intention of this malware permits a hacker remote to have right of entry to the operating system. A common function of an contaminated computer is its enclosure in a botnet. Hackers turn the apparatus into a zombie computer with the intention of might at present at the hands of a bot herder send out spam emails with the intention of carry a reputable email return address. The diminutive business owners in particular are normally staggered when receiving angry emails or phone calls regarding alleged spam emails their computers sent out.

  4. #4
    Join Date
    Mar 2011
    Posts
    442

    Re: How does a Trojan horse works

    Another superior reason for Trojan removal is the hacker’s capability to have right of entry data. Files might be uploaded or downloaded, the user’s screen becomes observable to a third party, supplementary malware might be installed at the hacker’s expediency and keystroke logging assists in stealing to have right of entry codes and responsive data. It is interesting to note with the purpose of the hacker who accesses the user’s system and the creator of the Trojans do not have encompassed to be the similar person. In fact, hackers regularly utilize port scanners to probe network hosts in an effort to locate ports to facilitate have been opened by Trojan malware programs. Even though additional commonly associated through computer worms, port scanners nevertheless offer the similar access for Trojan-infected machines.

  5. #5
    Join Date
    May 2011
    Posts
    460

    Re: How does a Trojan horse works

    Following the belief with the intention of an ounce of protection is worth a pound of cure, locating out how Trojan horses work be able to assist slam the door shut on this commencing form of malware. There are frequently four avenues of attack. A hacker utilizes a weak program and take advantage of a security flaw. Messaging programs are disreputable in this context, other than so are browsers and even media players. Updating sanctuary patches mechanically and choosing additional secure programs even if they come by means of a price tag attached saves time and money in the long run.

  6. #6
    Join Date
    Feb 2011
    Posts
    95

    Re: How does a Trojan horse works

    The trojan virus in addition commencing from the following. The shareware in general and download sites in meticulous are well-recognized sources of Trojans. Sharing files be supposed to be curtailed as much as probable and downloads be obliged to merely be accepted commencing from trusted sites. This goes hand in hand through the email attachments with the intention of might be hiding this malware. Recurrently these emails commencing from trusted sources, even if they were not sent by them. The odds are superior with the intention of a hacker-controlled botnet sent out emails containing the Trojans.

  7. #7
    Join Date
    Dec 2011
    Posts
    5

    Re: How does a Trojan horse works

    Trojan horses are common but dangerous programs that hide within other harmless programs. They work the same way the ancient Trojan horse did: Once they're installed, the program will infect other files throughout your system and potentially wreak havoc on your computer. They can even send important information from your computer over the Internet to the developer of the virus.

Similar Threads

  1. Trojan Horse generic 14.wvc
    By Adel123 in forum Networking & Security
    Replies: 3
    Last Post: 08-09-2009, 05:43 PM
  2. Trojan Horse Generic 12
    By Tungesh in forum Networking & Security
    Replies: 3
    Last Post: 13-08-2009, 10:11 PM
  3. Trojan.Horse.PSW.Agent.YOM on new MP3 what to do?
    By aimie077 in forum Networking & Security
    Replies: 4
    Last Post: 25-06-2009, 10:29 AM
  4. Trojan horse TR/spy.GEN, help
    By Dolla in forum Networking & Security
    Replies: 3
    Last Post: 10-03-2009, 07:44 PM
  5. Trojan Horse Generic11.ADC Help
    By man-u in forum Networking & Security
    Replies: 6
    Last Post: 21-08-2008, 02:54 PM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,750,307,391.07193 seconds with 16 queries