Sunday, April 11, 2010

virus trojen

Trojan horse is a program that does something undocumented which the programmer intended, but that the user would not approve of if he knew about it. According to some people, a virus is a particular case of Trojan Horse, namely one that is able to spread to other programs. A simple example of a Trojan Horse would be a program named “waterfalls.scr” claiming to be a free waterfall screensaver which, when run instead would allow access to the user’s computer.

TROJAN HORSE TYPES OF TROJAN HORSE PAYLOADS.
Trojan Horse payloads are almost always designed to do various harmful things, but could be harmless. They are broken down in classification based on how they breach system and the damage they cause: The eight main types of Trojan Horse payloads are: Remote access.
Data destructive email sending. Downloader. Proxy Trojan (disguising others as the infected computer). FTP Trojan (adding or copying data from the infected computer).
Security software disabler.
TROJAN HORSE This attack is used for the commission of financial crimes. The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed. E.g: A bank employees inserts a program into the bank’s serves that deducts a small amount of money from the account of every customer.

No comments:

Post a Comment