Logo free mcse ccna rhce linux java learning free mcse ccna rhce linux java learning
          Sharefacebook twitter google+ google bookmark yahoo bookmark delicious digg linkedin pinterest reddit stumbleupon evernote diigo blinklist blogmarks livejournal email feed


Computer Trojan Horses

External Resources

The Trojan Horse is another malware which got its name from mythological Trojan horse. In Trojan War, Greeks conquered and destroyed the city of Troy by constructing a huge wooden horse, and hiding Greek soldiers inside. Trojans pulled the Horse into their city as a victory trophy. At night the Greek soldiers came out of the Horse and opened the gates for the rest of the Greek army to capture the Troy city.

The Trojan Horse malware, normally appear to be useful software but will actually do damage once installed or run on your computer. Trojan Horses are normally designed to give hackers access to system. Trojan Horses will appear as useful programs but gives hackers the ability to change file settings, steal files or passwords, damage or alter files, or monitor users on computers etc.

Trojan Horses can alter or delete files from the infected computer, download files to the infected computer, modify registry settings, steal passwords, log keystrokes, disable anti-virus applications etc.

              Jajish Thomason Google+
Related Topics

No Related Topics Available

comments powered by Disqus

eXTReMe Tracker