A Trojan Horse is a kind of computer program that is used to break into a computer by masquerading as something else. It is named after the Trojan Horse, a trick used by the ancient Greeks to invade Troy, as the Trojans believed the horse was a harmless gift. These programs work by lurking within other programs, but they do not invade other files or spread like computer viruses do.
Trojan Horses are often spread by social engineering—the manipulation of the computer user into thinking the files are safe. For example, a Trojan Horse can be spread by sending a user a form that looks harmless but isn't. Some examples of Trojan Horses are backdoors, which send information to a user who is remote from the computer. The remote user then has total control over the computer and can send, receive, change, or delete files. The infected computer can also be used as a "botnet" to send spam or as a way to conduct attacks or carry out illegal activities with other computers as the targets. One particularly noxious kind of Trojan Horse promises to destroy viruses on your computer but instead installs them.
To recover from a Trojan Horse, you should disconnect your computer from the Internet, back up files, and then scan your system with an antivirus program. Once you've found and removed the corrupted files, you should reinstall your operating system. To prevent being affected by Trojan Horses, do not open attachments in e-mails that seem suspicious or that you did not ask for. In addition, install and update antivirus software on your computer, and install an Internet firewall.
Tuesday, October 13, 2015
What are Trojan Horses? How do they work? How does social engineering figure into their distribution (i.e., what is misleading about their installation or use)? What are some real-world examples? How are they prevented and/or removed?
Subscribe to:
Post Comments (Atom)
Why is the fact that the Americans are helping the Russians important?
In the late author Tom Clancy’s first novel, The Hunt for Red October, the assistance rendered to the Russians by the United States is impor...
-
There are a plethora of rules that Jonas and the other citizens must follow. Again, page numbers will vary given the edition of the book tha...
-
The poem contrasts the nighttime, imaginative world of a child with his daytime, prosaic world. In the first stanza, the child, on going to ...
-
The given two points of the exponential function are (2,24) and (3,144). To determine the exponential function y=ab^x plug-in the given x an...
-
The play Duchess of Malfi is named after the character and real life historical tragic figure of Duchess of Malfi who was the regent of the ...
-
The only example of simile in "The Lottery"—and a particularly weak one at that—is when Mrs. Hutchinson taps Mrs. Delacroix on the...
-
Hello! This expression is already a sum of two numbers, sin(32) and sin(54). Probably you want or express it as a product, or as an expressi...
-
Macbeth is reflecting on the Weird Sisters' prophecy and its astonishing accuracy. The witches were totally correct in predicting that M...
No comments:
Post a Comment