Home » » What is a trojan ?

What is a trojan ?

Written By Unknown on Tuesday, July 30, 2013 | 9:34 PM

In Greek mythology, there is a story about the Trojan War. This war lasted many years, as the Greeks could not penetrate the heavily barricaded city of Troy. So one day, a few of the Greek soldiers brought the people of Troy a large wooden horse, which they accepted as a peace offering. The horse was moved inside the city walls, where it sat until the night. After the people of the city had fallen asleep, Greek soldiers jumped out of the wooden horse, opened the gates to let their fellow soldiers in, and took over the city.

So what is the moral of this story? Mainly, beware of Trojan horses. But how does that relate to computers? That's a good question. In the computing world, Trojan horses are more than just a myth. They really exist and can cause damage to your computer. Trojan horses are software programs that masquerade as regular programs, such as games, disk utilities, and even antivirus programs. But if they are run, these programs can do malicious things to your computer.

For example, a Trojan horse might appear to be a computer game, but once you double-click it, the program starts writing over certain parts of your hard drive, corrupting your data. While this is certainly something you want to avoid, it is good to know that these malicious programs are only dangerous if they are given a chance to run. Also, most antivirus programs can catch Trojan horses when scanning for viruses. Unlike viruses, however, Trojan horses don't replicate themselves. Though it is possible for a Trojan horse to be attached to a virus file that spreads to multiple computers.

So as a general rule, don't open a program unless you know it is legitimate. This applies especially to e-mail attachments that are executable files. Even if you are pretty sure the attachment is OK, it is still a good idea to run it through your virus scan program (with the latest virus definitions) just to be safe. Remember what happened to the people of Troy -- don't let a Trojan horse catch you off guard.

If a computer is infected by a Trojan and has been controlled by the attacker, then several possibilities can occur. Among others, are as follows:
  •      deleting files
  •      Send and retrieve files
  •      Run application programs
  •      Peep the programs that are running
  •      Close the programs that run
  •      See what is being typed
  •      Opening and closing the CD-ROM drive
  •      Send messages and invites to talk (chat)
  •      Turning off the computer
Share this article :

0 comments:

Post a Comment

daftar online

Histats

Popular Posts

Status pengunjung

Flag Counter

page rank

Check Page Rank of your Web site pages instantly:

This page rank checking tool is powered by Page Rank Checker service

 
Support : Your Link | Your Link | Your Link
Copyright © 2013. Dunia teknologi dan sistem informasi - All Rights Reserved
Template Created by Creating Website Published by Mas Template
Proudly powered by Blogger