One, is otherwise useful software that has been corrupted by a cracker inserting malicious code that executes while the program is used. Examples include various implementations of weather alerting programs, computer clock setting software, and peer to peer file sharing utilities.
Part 1
|-1.What Is This Text About? \ |-2.What Is A Trojan Horse \ |-3.Trojans Today \ |-4.The future of the trojans \ |-5.Anti-Virus Scanners \ |-6.How You Can Get Infected? \ |-----From ICQ \ |-----From IRC \ |-----From Attachment \ |-----From Physical Access \ |-----From Trick \ |-7.How Dangerous A Trojan Can Be? \ |-8.Different Kinds Of Trojans \ |-----Remote Access Trojans \ |-----Password Sending Trojans \ |-----Keyloggers \ |-----Destructive Trojans \ |-----FTP Trojans \ |-9.Who Can Infect You? \ |-10.What is the attacker looking for? \Part 2
|-11.How The Trojans Works \ |-12.The Most Common Trojan Ports | |-13.How Can I Monitor My Comp for trojans without any scanner?| |-14.Software To Help You Monitor Your Computer | |-----Log Monitor /-----------------------> |-----PrcView |-----XNetStat |-----AtGuard |-----ConSeal PC FIREWALL |-----LockDown2000 |-----TDS |-15.Placing Backdoors In Programs |-16.Advices / |-17.Final Words /
The other type is a standalone program that masquerades as something else, like a game or image file, in order to trick the user into some misdirected complicity that is needed to carry out the program's objectives.
Thanks for reading & sharing Obay Corps
0 komentar:
Posting Komentar