Search

Computer Trojan Horses

The Trojan Horse is another malware which got its name from mythological Trojan horse. In Trojan War, Greeks conquered and destroyed the city of Troy by constructing a huge wooden horse, and hiding Greek soldiers inside. Trojans pulled the Horse into their city as a victory trophy. At night the Greek soldiers came out of the Horse and opened the gates for the rest of the Greek army to capture the Troy city.

The Trojan Horse malware, normally appear to be useful software but will actually do damage once installed or run on your computer. Trojan Horses are normally designed to give hackers access to system. Trojan Horses will appear as useful programs but gives hackers the ability to change file settings, steal files or passwords, damage or alter files, or monitor users on computers etc.

Trojan Horses can alter or delete files from the infected computer, download files to the infected computer, modify registry settings, steal passwords, log keystrokes, disable anti-virus applications etc.

Related Tutorials