[go: nahoru, domu]

Jump to content

Trojan horse (computing): Difference between revisions

From Simple English Wikipedia, the free encyclopedia
Content deleted Content added
No edit summary
m Reverted edits by 49.249.246.3 (talk) to last version by Jared837
Tag: Rollback
Line 2: Line 2:


A '''trojan horse''' (often just called '''trojan''') is a kind of software that is used for [[malware|malicious]] purposes. A trojan horse is a special type of [[computer program]]s that pretends to do a certain thing, but in reality it does something else, such as allow a stranger to access the computer and change it and read its information. In some cases the user notices, in other cases they do not. [[Spyware]] programs are examples of programs that work as trojans.
A '''trojan horse''' (often just called '''trojan''') is a kind of software that is used for [[malware|malicious]] purposes. A trojan horse is a special type of [[computer program]]s that pretends to do a certain thing, but in reality it does something else, such as allow a stranger to access the computer and change it and read its information. In some cases the user notices, in other cases they do not. [[Spyware]] programs are examples of programs that work as trojans.




Trojans are generally spread by some form of trickery, for example inducing users to click on bad popups, [[Email]], text, attachments, advertisements, or phony [[device driver]] updates. A trojan may act as a "backdoor" to the computer, contacting a controller which can then have unauthorized access to the affected computer. Trojans may also access users' personal information such as banking information, passwords, or personal identity (IP address). It can infect other devices connected to the network. Ransomware attacks are often carried out using a Trojan.
Trojans are generally spread by some form of trickery, for example inducing users to click on bad popups, [[Email]], text, attachments, advertisements, or phony [[device driver]] updates. A trojan may act as a "backdoor" to the computer, contacting a controller which can then have unauthorized access to the affected computer. Trojans may also access users' personal information such as banking information, passwords, or personal identity (IP address). It can infect other devices connected to the network. Ransomware attacks are often carried out using a Trojan.


It is rare to get a trojan on your computer by merely visiting a website, though it can happen. Usually, though, trojans are attached to something the user [[download]]s, such as music, wallpapers, backgrounds, games, and especially [[executable]] files (.exe).
It is rare to get a trojan on your computer by merely visiting a website, though it can happen. Usually, though, trojans are attached to something the user [[download]]s, such as music, wallpapers, backgrounds, games, and especially [[executable]] files (.exe).

MCP Can Help Getting Rid of Trojans And Protect Devices from Further Damage as Trojan can not be removed from computer it has be removed from the IP address as well.


Trojans were named after the [[Trojan Horse]] in [[Greek mythology]], given as a gift but with hidden destructive ability once the user lets it enter.
Trojans were named after the [[Trojan Horse]] in [[Greek mythology]], given as a gift but with hidden destructive ability once the user lets it enter.

Revision as of 16:17, 16 November 2018

For the original from Greek mythology, see Trojan Horse.

A trojan horse (often just called trojan) is a kind of software that is used for malicious purposes. A trojan horse is a special type of computer programs that pretends to do a certain thing, but in reality it does something else, such as allow a stranger to access the computer and change it and read its information. In some cases the user notices, in other cases they do not. Spyware programs are examples of programs that work as trojans.

Trojans are generally spread by some form of trickery, for example inducing users to click on bad popups, Email, text, attachments, advertisements, or phony device driver updates. A trojan may act as a "backdoor" to the computer, contacting a controller which can then have unauthorized access to the affected computer. Trojans may also access users' personal information such as banking information, passwords, or personal identity (IP address). It can infect other devices connected to the network. Ransomware attacks are often carried out using a Trojan.

It is rare to get a trojan on your computer by merely visiting a website, though it can happen. Usually, though, trojans are attached to something the user downloads, such as music, wallpapers, backgrounds, games, and especially executable files (.exe).

Trojans were named after the Trojan Horse in Greek mythology, given as a gift but with hidden destructive ability once the user lets it enter.