What is Computer Antivirus, Trojan Horses
Hi Freak Friends,
Here are again few defenitions of the terms involved in Virus, Antivirus, and Hacking.
So have a look.
What is Computer Antivirus :
A utility or you can say a computer software (Program) that searches your hard disk for viruses and removes any that are found. Most antivirus programs include an auto-update feature that enables the program to download new codes for Antivirus software for the profiles of new viruses so that it can check for the new viruses as soon as they are discovered by the Antivirus software company.
What is Trojan Horses :
A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your Computer of viruses but instead introduces viruses onto your computer.
Trojans usually consist of two parts, a Client and a Server. The server is run on the victim's machine and listens for connections from a Client used by the attacker.
When the server is run on a machine it will listen on a specific port or multiple ports for connections from a Client. In order for an attacker to connect to the server they must have the IP Address of the computer where the server is being run. Some trojans have the IP Address of the computer they are running on sent to the attacker via email or another form of communication.
Once a connection is made to the server, the client can then send commands to the server; the server will then execute these commands on the victim's machine.
If any body or by any mean if your computer get infected by the Trojan than your computer can be commanded by somebody else. The person at the other end of the Trojan will be able to handle your computer without your permission.
The term comes from the a Greek story of the Trojan War, in which the Greeks give a giant wooden horse to their foes, the Trojans, ostensibly as a peace offering. But after the Trojans drag the horse inside their city walls, Greek soldiers sneak out of the horse's hollow belly and open the city gates, allowing their compatriots to pour in and capture Troy.
Trojan horses are broken down in classification based on how they breach syatems and the damage they cause. The seven main types of Trojan horses are:
1) Remote Access Trojans
2) Data Sending Trojans
3) Destructive Trojans
4) Proxy Trojans
5) FTP Trojans
6) Security software disabler Trojans
7) Denial-of-service attack (DoS) Trojans
A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer. Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source. When a Trojan is activated on your computer, the results can vary. Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.
So Friends Bye for today tomorrow i will come with different terms used in the world of Virus, Antivirus, and Hacking.
Upto that try to listen the words of natuere........
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
For any Discussions, Questions, Ideas, Information, Inspirations, Suggestions, Please do Comment.