Question:
What is an trojan virus?
Sanjiv
2015-02-17 09:03:37 UTC
What is an trojan virus?
Nineteen answers:
Gustavo
2016-08-29 08:22:46 UTC
2
?
2015-02-18 02:26:09 UTC
A Trojan horse, or Trojan, in computing is a generally non-self-replicating type of malware program containing malicious code that, when executed, carries out actions determined by the nature of the Trojan, typically causing loss or theft of data, and possible system harm. The term is derived from the story of the wooden horse used to trick defenders of Troy into taking concealed warriors into their city in ancient Anatolia, because computer Trojans often employ a form of social engineering, presenting themselves as routine, useful, or interesting in order to persuade victims to install them on their computers.
?
2015-02-19 21:14:16 UTC
Trojans are malicious programs that perform actions that have not been authorized by the user. These actions can include:



Deleting data

Blocking data

Modifying data

Copying data

Disrupting the performance of computers or computer networks

Unlike computer viruses and worms , Trojans are not able to self-replicate.
MLM
2015-02-17 09:07:50 UTC
A Trojan horse, or Trojan, is a type of malware that disguises itself as a legitimate file. When you download and run the program, the Trojan horse will run in the background, allowing third-parties to access your computer.



To read more and to see definitions of other types of malware, go to the link below.
Edward
2015-02-20 17:40:00 UTC
A Trojan is a kind of malicious software that will do a lot of damage to your computer. A lot of times it happens when you download something from an untrustworthy source, or visit some inappropriate websites ;) It could be used for Identity Theft, data corruption, and overall unwanted stuff in general and you would be smart to avoid reddit, sourceforge, and other nefarious websites preaching free open source software.
Donald
2015-02-21 05:56:43 UTC
Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.
Sandeep
2015-02-19 02:44:05 UTC
A Trojan horse in computer term is a self-replicating type of malware program containing malicious code which execute in background of an application and typically causes loss or theft of data, and possible system harm.
Mo
2015-02-17 10:04:38 UTC
It's like the Trojan Horse that was taken into the city as a gift but inside were many soldiers who conquered the city.....a trojan virus does the same....looks safe but once inside your computer...causes havoc.
?
2015-02-18 05:19:09 UTC
Trojans are harmful programs that perform unauthorized actions like Deleting, Modifying, Copying, Blocking data and disrupting the performance of computer.
?
2015-02-18 04:14:44 UTC
Trojan Horse is a malicious program which performs all unauthorized tasks without the permission of the legitimate users like deleting or modifying data, disrupting the performance of computers and computer networks.
Charlie Tuna
2015-02-17 09:06:48 UTC
It's also known as the Trojan horse virus, based on the mythological legend about a giant hollow horse in which Greeks hid to gain entrance to Troy.



http://usa.kaspersky.com/internet-security-center/threats/trojans



http://en.wikipedia.org/wiki/Trojan_horse_%28computing%29
Reinhart
2015-02-18 05:36:33 UTC
You see that Trojan horse from troy.. its like an sneaking attack of a malicious code from the anti-virus, then when it only attack the antivirus detects it, creating notices to you "Virus detected".
Mark
2015-02-19 02:12:10 UTC
Trojan is the malicious program which is harmful to the computer and easily delete data. It is unauthorized user and harm your PC.
anonymous
2015-02-17 09:08:38 UTC
The EXACT same (metaphorically) as the Trojan Horse.
Christian
2015-02-17 09:06:14 UTC
it's a type of virus widely used by hackers to install a backdoor into your computer by attaching/disguising them into an exe/file in order to have access over your computer
Sparkle
2015-02-20 18:25:01 UTC
Trojans are malicious programs that perform actions that have not been authorized by the user. These actions can include:



Deleting data

Blocking data

Modifying data

Copying data

Disrupting the performance of computers or computer networks

Unlike computer viruses and worms , Trojans are not able to self-replicate.



How Trojans can impact you



Trojans are classified according to the type of actions that they can perform on your computer:



Backdoor

A backdoor Trojan gives malicious users remote control over the infected computer. They enable the author to do anything they wish on the infected computer – including sending, receiving, launching, and deleting files, displaying data, and rebooting the computer. Backdoor Trojans are often used to unite a group of victim computers to form a botnet or zombie network that can be used for criminal purposes.



Exploit

Exploits are programs that contain data or code that takes advantage of a vulnerability within application software that’s running on your computer.



Rootkit

Rootkits are designed to conceal certain objects or activities in your system. Often their main purpose is to prevent malicious programs being detected – in order to extend the period in which programs can run on an infected computer.



Trojan-Banker

Trojan-Banker programs are designed to steal your account data for online banking systems, e-payment systems, and credit or debit cards.



Trojan-DDoS

These programs conduct DoS (Denial of Service) attacks against a targeted web address. By sending multiple requests – from your computer and several other infected computers – the attack can overwhelm the target address… leading to a denial of service.



Trojan-Downloader

Trojan-Downloaders can download and install new versions of malicious programs onto your computer – including Trojans and adware.



Trojan-Dropper

These programs are used by hackers in order to install Trojans and / or viruses – or to prevent the detection of malicious programs. Not all antivirus programs are capable of scanning all of the components inside this type of Trojan.



Trojan-FakeAV

Trojan-FakeAV programs simulate the activity of antivirus software. They are designed to extort money from you – in return for the detection and removal of threats… even though the threats that they report are actually non-existent.



Trojan-GameThief

This type of program steals user account information from online gamers.



Trojan-IM

Trojan-IM programs steal your logins and passwords for instant messaging programs – such as ICQ, MSN Messenger, AOL Instant Messenger, Yahoo Pager, Skype, and many more.



Trojan-Ransom

This type of Trojan can modify data on your computer – so that your computer doesn’t run correctly or you can no longer use specific data. The criminal will only restore your computer’s performance or unblock your data, after you have paid them the ransom money that they demand.



Trojan-SMS

These programs can cost you money – by sending text messages from your mobile device to premium rate phone numbers.



Trojan-Spy

Trojan-Spy programs can spy on how you’re using your computer – for example, by tracking the data you enter via your keyboard, taking screen shots, or getting a list of running applications.



Trojan-Mailfinder

These programs can harvest email addresses from your computer.



Other types of Trojans include:

Trojan-ArcBomb

Trojan-Clicker

Trojan-Notifier

Trojan-Proxy

Trojan-PSW

How to protect yourself against Trojans



By installing effective anti-malware software, you can defend your devices – including PCs, laptops, Macs, tablets, and smartphones – against Trojans. A rigorous anti-malware solution – such as Kaspersky Anti-Virus 2014 – will detect and prevent Trojan attacks on your PC, while Kaspersky Mobile Security can deliver world-class virus protection for Android smartphones. Kaspersky Lab has anti-malware products that defend the following devices against Trojans:



Windows PCs

Linux computers

Apple Macs

Smartphones

Tablets
?
2015-02-22 05:07:38 UTC
I think this is a killer of software or programs.
Hridoy
2015-02-18 03:48:44 UTC
a antivirus software
Sanjiv
2015-02-17 09:23:52 UTC
thx


This content was originally posted on Y! Answers, a Q&A website that shut down in 2021.
Loading...