Twitter Instagram
Welcome To NEtechy India's Tech Zone

[Try this]$type=ticker$meta=0$readmore=0$snippet=0$columns=4

$show=home$type=grid$meta=0$readmore=0$snippet=0$count=4

$show=/search/label/How%20to$type=grid$meta=0$readmore=0$snippet=0$count=4$page=true

$show=/search/label/Hindi$type=grid$meta=0$readmore=0$snippet=0$count=4$page=true

$show=/search/label/What%20is$type=grid$meta=0$readmore=0$snippet=0$count=4$page=true

[Latest Posts]$show=home$type=three$page=true$count=9$h=250$space=0$icon=1$m=0$sn=0$rm=0

What is a Trojan horse Virus in Computer - malicious computer program

SHARE:

Trojan horse Virus in Computer What is a Trojan horse Virus in Computer What is a Trojan horse Virus in Computer What is a Trojan horse Virus in Computer

What is a Trojan horse Virus in Computer?

Trojan horse Virus in Computer

In computing, Trojan horse, or Trojan, is any malicious computer program which is used to hack into a computer by misleading users of its true intent. The term is derived from the Ancient Greek story of the wooden horse that was used to help Greek troops invade the city of Troy by stealth

Trojans are generally spread by some form of social engineering, for example where a user is duped into executing an e-mail attachment disguised to be unsuspicious, (e.g., a routine form to be filled in), or by drive-by download. 

Although their payload can be anything, many modern forms act as a backdoor, contacting a controller which can then have unauthorized access to the affected computer. This infection allows an attacker to access users' personal information such as banking information, passwords, or personal identity ( IP address).

Unlike computer viruses and worms, Trojans generally do not attempt to inject themselves into other files or otherwise propagate themselves

Destructive
  • Crashing the computer or device.
  • Modification or deletion of files.
  • Data corruption.
  • Formatting disks, destroying all contents.
  • Spreading malware across the network.
  • Spying on user activities and access sensitive information.
  • Use of resources or identity
  • Use of the machine as part of a botnet (e.g. to perform automated spamming or to distribute Denial-of-service attacks)
  • Using computer resources for mining cryptocurrencies.
  • Using the infected computer as a proxy for illegal activities and/or attacks on other computers.
  • Infecting other connected devices on the network.
  • Spying, surveillance or stalking

A few Trojans exploit a security imperfection in more established renditions of Internet Explorer and Google Chrome to utilize the host PC as an anonymizer intermediary to adequately shroud Internet use, empowering the controller to utilize the Internet for illicit purposes while all conceivably implicating proof shows the contaminated PC or its IP address. 

The host's PC could possibly demonstrate the web history of the locales saw utilizing the PC as an intermediary. The original of anonymizer Trojan steeds would, in general, leave their tracks in the online visit accounts of the host PC. Later ages of the Trojan pony tend to "spread" their tracks all the more proficiently. A few adaptations of Sub7 have been broadly circled in the US and Europe and turned into the most generally disseminated instances of this kind of Trojan steed 

In German-talking nations, spyware utilized or made by the administration is once in a while called programming. Govware is commonly a trojan pony programming used to catch interchanges from the objective PC. A few nations like Switzerland and Germany have a lawful system overseeing the utilization of such programming. Instances of programming trojans incorporate the Swiss MiniPanzer and MegaPanzer and the German "state trojan" nicknamed R2D2 

Because of the notoriety of botnets among programmers and the accessibility of publicizing administrations that license creators to abuse their clients' security, Trojan steeds are ending up progressively normal. As indicated by a study directed by BitDefender from January to June 2009, "Trojan-type malware is on the ascent, representing 83-percent of the worldwide malware distinguished on the planet." 

Trojans have an association with worms, as they spread with the assistance given by worms and travel over the web with them. BitDefender has expressed that around 15% of PCs are individuals from a botnet, generally enrolled by Trojan contamination.

Read Also


We Hope You Love The Articles- "What is a Trojan horse Virus in Computer" Do Share On Facebook And Whatsapp. Subscribe Us For More Awesome Content.

No comments:

You May Like

[Guide For You]_$type=list=$cate=2

Name

2019,3,3D,2,4G,1,4K,1,About,1,Accessories,3,Account,1,Advantages and Disadvantages,52,Advertisement,6,Affiliate Marketing,14,AI,1,AI assistant,1,Amazon,3,AMD,1,Android,21,Antivirus,5,App,12,Apple,7,Application,3,Asus,2,Backlinks,2,Battery,7,Benefits,16,BIOS,1,Bitcoin,1,Blog,27,Blogger,18,Blogging,27,Blogs,56,Bluetooth,5,Business,66,Cable,2,Camera,5,Card,1,Categories,1,CCTV,1,CD,3,CDMA,1,Cell Phone,3,Channel,1,Charger,3,Cloud Computing,1,Cloud Hosting,1,CMS,13,Company,2,Comparison,1,Computer,73,Computer Architecture,1,Computer Repairing,1,Computing,1,Content,6,cPanel,1,CPU,7,Data,1,Development,1,Device,1,Difference between,12,Digital Marketing,5,Digital Photo Frame,1,DIMM,1,DNS,2,Documents,1,Domain,14,Download,14,Drupal,1,E commerce,2,E-Commerce,12,eBay,1,EBooks,3,Email,4,Encryption,1,Energy,1,Error,3,Facebook,17,Facts,6,Features,14,File,2,File Format,6,Firewall,2,Fix,4,Flipkart,1,Floppy Disk,1,Free,18,Freelancer,4,Full Form,1,Full Guide,4,Games,18,Gmail,2,Google,33,Google Adsense,6,Google Analytics,1,GPS,1,Graphics,3,GTA,1,Guest Blogging,2,Guide,40,Guidelines,1,Hacking,2,Hard disk,2,Hardware,15,HD,1,HDD,1,HDMI,2,Headphone,1,Hindi,64,History,36,Home,1,How,36,How to,232,HTML,4,Icon,3,Ideas,6,Images,3,India,7,Information,3,Instagram,2,Intel,1,Internet,29,Internet Entrepreneur,1,Internet Marketing,6,Introduction,4,iOS,2,iPad,1,iPhone,3,IVR System,1,JavaScript,1,Jio,1,Jobs,1,Keyboard,8,Keyboard Shortcuts,1,Keyword,1,Laptop,22,Learn,1,Link,2,Mac Os,6,Machine,3,Magento,1,Marketing,14,Microsoft,8,Mistakes,2,Mobile,7,Money Transfer,1,Monitor,2,Motherboard,5,Mouse,3,MS Office,1,Music,1,Name,1,Netbook,1,Network,11,News,46,Niche,3,Online,11,Online Advertising,2,Online Chat,1,Online Marketing,1,Online Money,42,Online Store,3,Online Surveys,1,Operating System,13,Page,2,Password,6,Payment Service,1,PayPal,2,PC,11,PC Games,8,PDF,3,Pendrive,2,Permalink,1,Personal Assistant,1,Phone,1,Photography,2,PHP,3,Picture,1,Plotter,1,Plugins,4,Pocket PC,1,Post,1,Power Bank,1,PPC,1,Processor,7,Product,3,Programming Language,5,Pros And Cons,3,Purchasing,1,Q&A,1,RAM,2,Ranking,1,Refurbished,3,Refurnished,1,Resolution,1,Review,4,Router,1,Satellite,2,Screen,3,SD Card,1,Search Engine,8,Security,1,SEO,49,Server,4,Service,1,Shopify,1,Sign Up,1,Sitemap,2,Smartphone,1,SMO,1,SMS,1,Social Media,19,Software,27,Solar Panel,1,Solutions,1,SSD,2,SSL,1,Steps,9,Storage,1,Strategy,2,Success,22,System Requirement,1,System Specifications,1,Tablet PC,2,Techniques,4,Technology,10,Telephone,1,Television,6,Templates,3,TikTok,2,Timeline,1,Tips,43,Tools,3,Top List,20,Touch Screen,2,Tricks,8,Tutorial,11,TV,2,Twitter,5,Types,13,USB,8,Vector,1,Video,1,Video Card,2,Virus,7,VPN,3,VPS,2,Wallpaper,1,WEB,3,Web Browser,10,Web Design,1,Web Designer,1,Web Development,1,Web Hosting,14,Web Server,1,Webmaster,2,Website,106,Website Traffic,8,What Exactly,1,What is,261,WhatsApp,1,Why,33,Widget,1,WiFi,5,Wikipedia,1,Windows,29,Windows Installation,1,Wireless,1,Word,1,WordPress,25,XML Programming Language,1,YouTube,7,
ltr
item
NETechy: What is a Trojan horse Virus in Computer - malicious computer program
What is a Trojan horse Virus in Computer - malicious computer program
Trojan horse Virus in Computer What is a Trojan horse Virus in Computer What is a Trojan horse Virus in Computer What is a Trojan horse Virus in Computer
https://1.bp.blogspot.com/-AxxKp0iwLYg/XSM6xGDUfAI/AAAAAAAAHIs/9f6efN4zdHUmJ65CIpossUUDCE3WfpiFwCLcBGAs/s1600/What-is-a-Trojan-horse-Virus-in-Computer.png
https://1.bp.blogspot.com/-AxxKp0iwLYg/XSM6xGDUfAI/AAAAAAAAHIs/9f6efN4zdHUmJ65CIpossUUDCE3WfpiFwCLcBGAs/s72-c/What-is-a-Trojan-horse-Virus-in-Computer.png
NETechy
https://www.netechy.com/2019/07/Trojan-Horse-Virus-in-Computer.html
https://www.netechy.com/
https://www.netechy.com/
https://www.netechy.com/2019/07/Trojan-Horse-Virus-in-Computer.html
true
751342609679224409
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS CONTENT IS PREMIUM Please share to unlock Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy