Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Standard view
Full view
of .
Look up keyword
Like this
0 of .
Results for:
No results containing your search query
P. 1


|Views: 24|Likes:
Published by Yad Vantes

More info:

Published by: Yad Vantes on Oct 27, 2010
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as DOCX, PDF, TXT or read online from Scribd
See more
See less





Trojan horse
, or 
, is malware that appears to perform a desirable function for the user prior to run or install but instead facilitates unauthorized access of the user's computer system.
"It is a harmful  piece of software that looks legitimate. Users are typically tricked into loading and executing it on their systems" 
, asCiscodescribes.
The term is derived from the Trojan Horsestory inGreek mythology.
Purpose and operation
A horse may modify the user's computer to display advertisements in undesirable places, such asthedesktopor in uncontrollablepop-ups, or it may be less notorious, such as installing atoolbar on to the user'sWeb browser without prior notice. This can create the author of the Trojan revenue, despite it beingagainst theTerms of Service of most major Internet advertising networks, such asGoogle AdSense.
Trojan horses may allow a hacker  remote access to a target computer system. Once a Trojan horse has been installed on a target computer system, a hacker may have access to the computer remotely andperform various operations, limited by user privileges on the target computer system and the design of theTrojan horse.Operations that could be performed by a hacker on a target computer system include:
Use of the machine as part of abotnet(e.g. to perform automated spammingor todistribute Denial- of-service attacks)
Data theft (e.g. retrieving passwords or credit card information)
Installation of software, including third-party malware
Downloading or uploadingof files on the user's computer 
Modification or deletion of files
Crashing the computer Trojan horses in this way require interaction with ahacker to fulfill their purpose, though the hacker neednot be the individual responsible for distributing the Trojan horse. It is possible for individual hackers toscan computers on a network using a port scanner in the hope of finding one with a malicious Trojan horse installed, which the hacker can then use to control the target computer.
Installation and distribution
Trojan horses can be installed through the following methods:
Software downloads
Bundling (e.g. a Trojan horse included as part of a software application downloaded from a filesharing network)
Websites containing executable content (e.g., a Trojan horse in the form of anActiveXcontrol)
Application exploits (e.g., flaws in a Web browser, media player, instant-messaging client, or other software that can be exploited to allow installation of a Trojan horse)Some users, particularly those in theWarez scene, may create and distribute software with or withoutknowing that a Trojan has been embedded inside.Compilersandhigher-levelsoftware makers can be written to attach malicious software when the author compiles his code to executable form.[edit]
A Trojan horse may itself be a computer virus, either by asking other users on a network, such as a instant-messaging network, to install the said software, or by spreading itself through the use of application exploits.[edit]

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->