Table of Contents:
-Title Page
-Introduction
-Bibliography
Threats:
-Viruses
-Trojans
-Spyware
-Phishing
-Basic Security
-Free Programs
|
Trojan Horse
In Greek Mythology, the Greeks offered the soldiers of Troy a present, a giant wooden horse which contained a large number of Greek soldiers. The Trojans accepted the gift and let the wooden horse in and when night time came, the Greeks sieged the city of Troy. The Trojan Horse, in computer terms is very similar to the myth by tricking the user that a program or other software is very useful when in reality is very dangerous.
Though the Trojan Horse is sounds very similar to a virus, but in this case, the Trojan might actually be useful and can be installed without prior knowledge. The Trojan Horse uses the legitimate program as a cloak, so that it can install itself in the background. There are numerous amounts of Trojans floating around on the Internet, doing different things such as installing a backdoor, so that the creator of the Trojan can hi-jack your computer later, delete or change files, use your computer to attack other computers, or in the worse case, install a keystroker which is a program that writes all the keys you type in hoping that the infected user would type important information like passwords, credit card numbers and other important information.
Trojan Horses, like viruses, can easily be avoided if the end-user uses some precaution and not install programs that look suspicious or come from sources unknown. A good antivirus software can easily check your files too see if it contains any malicious software. Remember, as long as the software isn't opened, it cannot install the Trojan Horse.
|
Important Links
Spybot: Search and Destroy
Hi-Jack This
Handler's Diary
Spyware Guide Database
Microsoft Anti-Spyware
Norton Anti-virus
|