![]() ![]() This makes them very difficult to detect with antivirus software. They even have password protection and encryption features for intruders to protect the computers they own! There are hundreds, maybe even thousands, of trojan programs circulating the Internet, usually with many variations of the code. They give an intruder access to just about every function of the computer including logging keystrokes, activating the webcam, logging passwords, uploading and downloading files, and much, much more. Backdoors operate in a client-server architecture and allow the intruder to have complete control of a victim’s computer, remotely over the network. In the information security field, trojans are malicious programs that are often disguised as other programs such as jokes, games, network utilities, and sometimes even the trojan removal program itself! Trojans are often used to distribute backdoor programs without the victim being aware that they are being installed. Once the horse was brought inside the city walls of Troy, the Greek soldiers that were hiding inside of the hollow horse emerged and assisted in capturing the city. In the story of the Trojan war, the Greeks left a large wooden horse as an apparent peace offering to the Trojans. ![]() The term trojan horse originally came from the Greek epic poem the Iliad, by Homer.
0 Comments
Leave a Reply. |