[go: nahoru, domu]

Jump to content

Trojan horse (computing): Difference between revisions

From Simple English Wikipedia, the free encyclopedia
Content deleted Content added
Reverted 1 edit by 182.76.25.106 (talk): Talk in article. (TW)
Tag: Undo
No edit summary
Line 4: Line 4:


Trojans are generally spread by some form of trickery, for example inducing users to click on bad popups, [[Email]], text, attachments, advertisements, or phony [[device driver]] updates. A trojan may act as a "backdoor" to the computer, contacting a controller which can then have unauthorized access to the affected computer. Trojans may also access users' personal information such as banking information, passwords, or personal identity (IP address). It can infect other devices connected to the network. Ransomware attacks are often carried out using a Trojan.
Trojans are generally spread by some form of trickery, for example inducing users to click on bad popups, [[Email]], text, attachments, advertisements, or phony [[device driver]] updates. A trojan may act as a "backdoor" to the computer, contacting a controller which can then have unauthorized access to the affected computer. Trojans may also access users' personal information such as banking information, passwords, or personal identity (IP address). It can infect other devices connected to the network. Ransomware attacks are often carried out using a Trojan.

If you are using Apple device Get Apple Certified Firewall so as to minimize the damage and safe yourself from identity theft.


It is rare to get a trojan on your computer by merely visiting a website, though it can happen. Usually, though, trojans are attached to something the user [[download]]s, such as music, wallpapers, backgrounds, games, and especially [[executable]] files (.exe).
It is rare to get a trojan on your computer by merely visiting a website, though it can happen. Usually, though, trojans are attached to something the user [[download]]s, such as music, wallpapers, backgrounds, games, and especially [[executable]] files (.exe).


Trojans were named after the [[Trojan Horse]] in [[Greek mythology]], given as a gift but with hidden destructive ability once the user lets it enter.


{{tech-stub}}
{{tech-stub}}

Revision as of 19:01, 7 March 2019

For the original from Greek mythology, see Trojan Horse.

A trojan horse (often just called trojan) is a kind of software that is used for malicious purposes. A trojan horse is a special type of computer programs that pretends to do a certain thing, but in reality it does something else, such as allow a stranger to access the computer and change it and read its information. In some cases the user notices, in other cases they do not. Spyware programs are examples of programs that work as trojans.

Trojans are generally spread by some form of trickery, for example inducing users to click on bad popups, Email, text, attachments, advertisements, or phony device driver updates. A trojan may act as a "backdoor" to the computer, contacting a controller which can then have unauthorized access to the affected computer. Trojans may also access users' personal information such as banking information, passwords, or personal identity (IP address). It can infect other devices connected to the network. Ransomware attacks are often carried out using a Trojan.

If you are using Apple device Get Apple Certified Firewall so as to minimize the damage and safe yourself from identity theft.

It is rare to get a trojan on your computer by merely visiting a website, though it can happen. Usually, though, trojans are attached to something the user downloads, such as music, wallpapers, backgrounds, games, and especially executable files (.exe).