Trojan Horses: Troy Met Its End Because Of One.
Computers & Technology → Internet
- Author Mindy Matter
- Published November 5, 2010
- Word count 419
Now they are all over the internet and can be the end for you. A Trojan Horse! When most computer users think of a Trojan horse they usually think of a computer virus. This is, however, incorrect because a virus and Trojan horse are two different nuisances that are known as Malware (Malicious Software). Trojan horses receive their moniker by being disguised as different programs, even anti-virus programs which make people think they are there to help but do the exact opposite. Trojan Horses are categorized in to seven different varieties based on how they get in and the damage that can be done. The first four Trojans that will be explained are the most damage dealing to a user and their system and the last three deal damage to other systems.
The first and most dangerous kind of Trojan horse are called Remote Access Trojans, also known as (RATS). (RATS) can be used to gather private information such as a credit cards, bank accounts, and even social security numbers. (RATS) can also take control of a computer, making disc trays open or causing your screen to flip around. The second variety are known as Data Sending Trojans, a type of Trojan which will focus only on collecting a person’s personal data including contact lists. This Trojan will often use a "Keylogger" which keeps a record of every single keystroke that person has made. The third is called a Destructive Trojan which is the closest a Trojan can get to being a virus as it is meant to delete files and slowly wither away a computer similar to a virus. Security Software Disabler Trojans are used in part with other Trojans as they are meant to disable any anti-virus programs and security a user is running without the user knowing.
The last three Trojan horse varieties are unique as they do not directly attack the victims computer but use victims computers as a means to do harm to others. Proxy Trojans and FTP Trojans both allow the attacker to use a victim’s computer to conduct credit card fraud and other illegal activities using special connections. The seventh and constantly changing Trojan is called a Denial-of-service attack (DoS). This Trojan is similar to the previous two Trojans as they use a special connection to cause trouble but on a larger scale. (DoS) will attack a whole network and bring everything to a crawl or halt. So be careful what programs you download and keep your anti-virus software updated.
By Mindy Matter for http://www.removeadware.com.au - Here you'll learn more about Trojans http://www.removeadware.com.au/articles/trojans/
Article source: https://articlebiz.comRate article
Article comments
There are no posted comments.
Related articles
- What is CCTLD?
- Gulf Website Hub Reveals Fresh Digital Solutions to Enhance Dubai's Expanding Market.
- Embrace Multi Graphics Inc. Expands Services to Meet Growing Demand in Digital Marketing, Design, and Printing
- Website Development Trends in 2025
- Viewing Instagram Stories Without an Account: Imginn Viewer Insights
- How to Find, Use, and Manage BitLocker Recovery Keys on Windows 10/11
- Building a Professional Website on a Budget: Using Free Tools like WordPress and AI
- Ava Labs CEO On Why You Shouldn't Ignore Red Flags In The Industry
- Cyberbullying: Empowering Families to Safeguard Their Kids
- 10 Common Online Scams to Avoid: Protecting Your Identity and Finances
- Spring Break and Staying Secure Online: An Internet Safety Guide for College Students
- Unveiling the Future: The 10 Revolutionary Trends Shaping Small E-Commerce Businesses in 2024
- Unlocking Online Content with YouTube Video Downloaders
- Unleashing the Potential of Online Earning: A Comprehensive Guide
- Navigating Success in the Digital Realm: Unveiling the Power of Digital Marketing
- How AI Will Affect the Future of Search
- Maximizing Business Efficiency: The Strategic Role of Business Intelligence with DataInseyets
- Cyber Resilience in the Age of AI
- Harnessing the Power of AI & Blockchain for Data Security and Transparency
- AI Ignites 6G Advancements in Wireless Technology
- How AI is Revolutionizing Content Writing
- What You Need to Know About Writing Prompts
- The Remarkable Ways to Use the AI-Powered Chatbot
- Where Will AI Take Us in 2024?
- AI Written Content Creation Trends for 2024
- Will AI-Linked Cryptocurrency Sector Thrive in 2024?
- Is AI Regulation vs AI Deregulation a Real Concern?
- Prompt Engineering: A Beginner's Guide to Prompt Engineering
- Balancing Innovation and Regulation of AI in the Future
- Crafting AI Short-Form Content: The Future of Digital Marketing