[go: nahoru, domu]

Jump to content

Trojan horse (computing): Difference between revisions

From Simple English Wikipedia, the free encyclopedia
Content deleted Content added
reword explanation; remove red link; remove unnecessary pipe for category (same initial word); grammar
No edit summary
Line 8: Line 8:


Trojans were named after the [[Trojan Horse]] in [[Greek mythology]], given as a gift but with hidden destructive ability once the user lets it enter.
Trojans were named after the [[Trojan Horse]] in [[Greek mythology]], given as a gift but with hidden destructive ability once the user lets it enter.

Implementing Ip Firewall Protection can help home and small business from preventing these trojan attacks.
Can get here https://www.ssl2buy.com/


{{tech-stub}}
{{tech-stub}}

Revision as of 16:03, 16 November 2018

For the original from Greek mythology, see Trojan Horse.

A trojan horse (often just called trojan) is a kind of software that is used for malicious purposes. A trojan horse is a special type of computer programs that pretends to do a certain thing, but in reality it does something else, such as allow a stranger to access the computer and change it and read its information. In some cases the user notices, in other cases they do not. Spyware programs are examples of programs that work as trojans.

Trojans are generally spread by some form of trickery, for example inducing users to click on bad popups, Email, text, attachments, advertisements, or phony device driver updates. A trojan may act as a "backdoor" to the computer, contacting a controller which can then have unauthorized access to the affected computer. Trojans may also access users' personal information such as banking information, passwords, or personal identity (IP address). It can infect other devices connected to the network. Ransomware attacks are often carried out using a Trojan.

It is rare to get a trojan on your computer by merely visiting a website, though it can happen. Usually, though, trojans are attached to something the user downloads, such as music, wallpapers, backgrounds, games, and especially executable files (.exe).

Trojans were named after the Trojan Horse in Greek mythology, given as a gift but with hidden destructive ability once the user lets it enter.

Implementing Ip Firewall Protection can help home and small business from preventing these trojan attacks. Can get here https://www.ssl2buy.com/