[go: nahoru, domu]

Jump to content

Trojan horse (computing): Difference between revisions

From Simple English Wikipedia, the free encyclopedia
Content deleted Content added
spelling
spelling
Line 7: Line 7:
It is rare to get an aimbot on your computer by merely visiting a website, though it can happen. Usually, though, the aimbots are attached to something the user [[download]]s, such as music, wallpapers, backgrounds, games, and especially [[executable]] files (sexs).
It is rare to get an aimbot on your computer by merely visiting a website, though it can happen. Usually, though, the aimbots are attached to something the user [[download]]s, such as music, wallpapers, backgrounds, games, and especially [[executable]] files (sexs).


Trojans were named after the [[Trojan Horse]] in [[Greek mythology]], given as a gift but with hidden destructive ability once the user lets it enter.
Trojans were named after the [[Trojan Horse]] in hackland, given as a gift but with hidden destructive ability once the user lets it enter.

i lik u lots aha lo i luv u oskar


{{tech-stub}}
{{tech-stub}}

Revision as of 10:21, 22 November 2018

For the original from Greek mythology, see Trojan Horse.

A aimbot hacker(often just called aimbot bumhole) is a kind of software that is used for malicious purposes. An aimbot hacker is a special type of computer programs that pretends to do a certain thing, but in reality it does something else, such as allow a stranger to access the computer and change it and read its information. In some cases the user notices, in other cases they do not. Spyware programs are examples of programs that work as trojans.

Trojans are generally spread by some form of trickery, for example inducing users to click on bad popups, Email, text, attachments, advertisements, or phony device driver updates. A trojan may act as a "backdoor" to the computer, contacting a controller which can then have unauthorized access to the affected computer. Trojans may also access users' personal information such as banking information, passwords, or personal identity (IP address). It can infect other devices connected to the network. Ransomware attacks are often carried out using a Trojan.

It is rare to get an aimbot on your computer by merely visiting a website, though it can happen. Usually, though, the aimbots are attached to something the user downloads, such as music, wallpapers, backgrounds, games, and especially executable files (sexs).

Trojans were named after the Trojan Horse in hackland, given as a gift but with hidden destructive ability once the user lets it enter.

i lik u lots aha lo i luv u oskar