Trojan HorseTrojan Horse
ITGD 2202
Assistant Professor Assistant Professor Dr. Sana’a Wafa Al-SayeghDr. Sana’a Wafa Al-Sayegh
supervision
Mohammed F. Abu Lamdy
Definition
Types of Trojan Horse
Types of Trojan Horse Payloads
Process
1
2
3
4
Main Category:-
5 How To Avoid From Be Infected
6 How To Remove
7 Conclusion
A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user.
A Trojan Horse is a program that installs malicious software while under the guise of doing something else.
DEFINITION
There are two common types of Trojan horses:There are two common types of Trojan horses: 1.One is ordinary software that has been corrupted by hacker. A cracker inserts malicious code into the program that executes while the program is used.
Example : crack software ,p2p file sharing utilities.2.Standalone program that masquerades as something
else ,like a game or image file, in order to trick the user into running the program.
Types Of Trojan Horse
There are two types of Trojan Horse :
-Time Bomb and Logic Bomb
-Droppers
Type Of Trojan Horse payloads
1-Time Bomb activate on particular dates and times.
2-Logic Bomb activate on certain condition met by computer.
3-Droppers perform two tasks at once. A dropper form a legitimate but also installs a computer virus or a computer worm on a system or disk at the same time.
Process
Do not open the unexpected attachments on emails
Do not surf to the unknown website.
Do not download anything from the stranger website.
How To Avoid From Be Infected
Use the following tools :
The program is called smitfraudfixsiri.geekstogo.com/SmitfraudFix.php
Just follow the instruction thereDownload Grisoft Avg 7.5 Anti-Virus, Anti-Malware.Free edition
A-SQUAREDemsisoft.com/en/software/free
Anti-spyware comparisonhttp://www.2-spyware.com/compare.php
How To Remove
We need to be careful when download something. We also need an Anti-Malware and anti-virus to protect our computer from be
infected by virus.
We need to be a smart user because this can help us from be tricked with nice thing but behind the scenes it infects our
computer with a Trojan or Worm.
Conclusion
Reference
• http://au.answers.yahoo.com/question/index?qid=20070515130138AAlllwf
• http://en.wikipedia.org/wiki/Trojan_horse_(computing)
Top Related