Trojan Horse Presentation

10

description

 

Transcript of Trojan Horse Presentation

Page 1: Trojan Horse Presentation
Page 2: Trojan Horse Presentation

Content

Definition Types of Trojan Horse Types of Trojan Horse Payloads Process How To Avoid From Be Infected How To Remove Conclusion Reference

Page 3: Trojan Horse Presentation

DEFINITION

A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user.

A Trojan Horse is a program that installs malicious software while under the guise of doing something else.

Page 4: Trojan Horse Presentation

Types Of Trojan Horse

There are two common types of trojan horses:

1.One is ordinary software that has been corrupted by hacker.A

cracker inserts malicious code into the program that executes

while the program is used.

Example : Implementations of weather alerting programs,

computer clock setting software and p2p file

sharing utilities.

2.Standalone program that masquerades as something else,

like a game or image file, in order to trick the user into running

the program.

Page 5: Trojan Horse Presentation

Type Of Trojan Horse payloads

There are two types of Trojan Horse : -Time Bomb and Logic Bomb -Droppers

Page 6: Trojan Horse Presentation

Process

Time Bomb activate on particular dates and times. Logic Bomb activate on certain condition met by computer. Droppers perform two tasks at once. A dropper form a

legitimate but also installs a computer virus or a computer

worm on a system or disk at the same time.

Page 7: Trojan Horse Presentation

How To Avoid From Be Infected

Do not download anything from the stranger website. Do not surf to the unknown website. Do not open the unexpected attachments on emails

Page 8: Trojan Horse Presentation

How To Remove

Use the following tools : The program is called smitfraudfix

http://siri.geekstogo.com/SmitfraudFix.php

Just follow the instruction there

Download Grisoft Avg 7.5 Anti-Virus, Anti-Malware.Free edition

http://free.grisoft.com/doc/5390/lng/us/...http://free.grisoft.com/doc/5390/lng/us/...

Page 9: Trojan Horse Presentation

Conclusion

We need to be careful when download something. We also need an anti-virus to protect our computer from be infected by virus.

We need to be a smart user because this can help us from be tricked with nice thing but behind the scenes it infects our computer with a Trojan or Worm.

Page 10: Trojan Horse Presentation

Reference

http://au.answers.yahoo.com/question/index?qid=20070515130138AAlllwf

http://en.wikipedia.org/wiki/Trojan_horse_(computing)