What's Trojan Virus?

What are the advantages compared to other Virus Trojan ? Virus Trojan can compromise remote access to a target computer system. Operations that can be performed by a hacker on computer systems that are targeted include Damaging a computer system, such as the appearance of a blue screen on your computer, Formatting a disk, destroying all the contents of your computer data, use of the system automatically as botnets for example spamming auto, theft of electronic money, infect other connected devices, Data theft and banking network information, including confidential files, sometimes for industrial espionage, and information with financial implications such as passwords and credit card payments and the modification or deletion of files. With the purpose of sending that data to the author, that some of the greatness of the Trojans, the effect actually depends on the types of trojan infected on your computer device.

What's Trojan Virus

What is Virus Trojan?

Trojan virus, or often referred to as a form of Trojan horse is a program that masquerades as a harmless application. Unlike other viruses, Trojan horses do not replicate themselves but they can damage and reduce the performance of your koputer like other viruses. One of the most dangerous types of Trojan horse is a program that claims to rid your computer of viruses, but the contrary is not cleaning but introduces viruses onto your computer.

Why is The Trojan Horse?

The term Trojan horse comes from the Greek story of the time of the war with the Trojan or worm, Citadel Trojan defense and city walls is one of the strongest fortress of the time, not easily penetrate a defense and as strong as a Trojan. Then the Greek attack strategies performed by means of infiltration of the strongest army Greece was added to a giant wooden horse, and gave it to their Trojan enemies, as if as a peace offering.

But after the Trojans drag the giant wooden horse inside their city walls, Greek soldiers sneak out of the horse hollow belly and open the city gates, so that their colleagues who are outside can enter the city gates and tear down all the Trojan defense, the army and everything in it. Likewise with this way of spreading Trojan virus, trojan famous fashion infiltration and disguise, they rarely cause symptoms and even they are not easily detected as malicious program. The types of Trojan horse is divided and classified based on how they attack the system, the target and any damage caused.

The Types of Trojan Virus
  • Remote Access Trojan
Abbreviated as RAT, is one of the seven main types of Trojan horse is designed to provide the attacker with complete control of the victim system. Attackers usually hides a Trojan horse virus is in the game and other small programs that unsuspecting users then run on their PCs.
  • Data Delivery Trojan
This type of Trojan horse is a program designed to obtain critical data from attacks target sensitive data such as account, password, credit card information, files, log e-mail address, or so forth. Trojan of this type can search for and transmit data to the PC and your computer, or they could install a keylogger and send all recorded keystrokes and then sent back the information to the attackers or often called hackers or cybercrime who designed the virus.
  • Trojan Charge of Damaging Computer
Destroyer Trojan is a type of Trojan horse designed to destroy and delete files, and more like a Trojan virus than others. It is often not detected by antivirus software you use, especially if you use antivirus software is not up to date.
  • Proxy Trojan
A type of Trojan horse designed to use the victims computer as a proxy server. This gives the attacker the opportunity to do everything from your computer, such as a valid transaction at the Bank, including the possibility of conducting credit card fraud and other illegal activities, or even to use your system to launch malicious attacks against other networks.
  • File Transfer Protocol (FTP)
A type of Trojan horse designed to open port 21 (file transfer protocol) and allows attackers to connect to your computer using the File Transfer Protocol (FTP).
  • Security software disabler Trojan
A type of Trojan horse designed to stop or kill security programs such as antivirus programs or firewall without the user in mind. This type of Trojan is usually combined with other types of Trojan as a payload
  • DdoS attack
Denial of Service attack or DoS attacks, a type of attack on a network that is designed to bring the network down by flooding the traffic. Many DoS attacks, such as Ping of Death and Teardrop attacks, exploit limitations in the TCP / IP protocol. For all known DoS attacks, there is an improvement software system administrators can install to limit the damage caused by the attack. But, like a virus, a new DoS attacks are constantly by hackers.

Protection Against Attacks

Vigilance is the key to avoiding infection from the virus. To prevent Trojan horse, you should not download any file unless derived from reliable sources. Trojan horses can masquerade as all types of files such as music files, video, pop-up ads even anti virus, this virus usually have to be activated to cause damage to the computer. That's why the Trojan file extensions are generally shaped like a .vbs .exe or .bat .com. Always check the file extension before opening any files, and never open a file or click on a link at random.

Removing Trojan Horse

The only way to guarantee 100 percent of your computer is protected from infection is to reformat your computer's hard drive and reinstalling the operating system clean. It is a laborious process as well harmful because it can delete important files that you have. Another possible solution is to use anti-virus software and anti-Trojan. Only variations of the Trojan sometimes exceed the speed up-date antivirus program.

Because the effects of damage caused by a very severe trojan then you should wear the best anti-virus or antivirus premium and make sure that you use is always up to date.
loading...
loading...

Comments

Popular posts from this blog

Dunia Yang Menakjubkan

Natural Beauty Of Western Sumatera Indonesia

6 Games Terminal Linux-based CLI

OverClock Adalah Cara Efektif Untuk Meningkatkan Kinerja Komputer

Differences in Language Java And C++ Program