..::Mohon maaf atas ketidaknyamanan Anda mengunjungi blog saya. Blog ini masih dalam tahap perbaikan, agar lebih tertata rapi. Selalu gunakan fitur search engine disebelah kanan guna mempermudah pencarian isi konten di blog ini. Terimakasih::..
Home » , , , » There are two common types of Trojan horses.

There are two common types of Trojan horses.

Posted by Obay Corps on 14 Juli 2008

One, is otherwise useful software that has been corrupted by a cracker inserting malicious code that executes while the program is used. Examples include various implementations of weather alerting programs, computer clock setting software, and peer to peer file sharing utilities.

Part 1

|-1.What Is This Text About? \ |-2.What Is A Trojan Horse \ |-3.Trojans Today \ |-4.The future of the trojans \ |-5.Anti-Virus Scanners \ |-6.How You Can Get Infected? \ |-----From ICQ \ |-----From IRC \ |-----From Attachment \ |-----From Physical Access \ |-----From Trick \ |-7.How Dangerous A Trojan Can Be? \ |-8.Different Kinds Of Trojans \ |-----Remote Access Trojans \ |-----Password Sending Trojans \ |-----Keyloggers \ |-----Destructive Trojans \ |-----FTP Trojans \ |-9.Who Can Infect You? \ |-10.What is the attacker looking for? \
Part 2
|-11.How The Trojans Works \ |-12.The Most Common Trojan Ports | |-13.How Can I Monitor My Comp for trojans without any scanner?| |-14.Software To Help You Monitor Your Computer | |-----Log Monitor /-----------------------> |-----PrcView |-----XNetStat |-----AtGuard |-----ConSeal PC FIREWALL |-----LockDown2000 |-----TDS |-15.Placing Backdoors In Programs |-16.Advices / |-17.Final Words /



The other type is a standalone program that masquerades as something else, like a game or image file, in order to trick the user into some misdirected complicity that is needed to carry out the program's objectives.

Thanks for reading & sharing Obay Corps

Previous
« Prev Post

0 komentar:

Cari di Blog Ini

Popular Posts