Question:
whats a trojan virus ?
anonymous
1970-01-01 00:00:00 UTC
whats a trojan virus ?
Eighteen answers:
?
2016-03-11 06:15:57 UTC
Greetings. My name's Sanjay Patel, and I currently hold an honorary Master's degree in the field of Computer Science. I am aware of, and have personal knowledge related to your question. There are computer maintenance businesses which are probably in your area, however they come at the cost of hiring a professional to enter your home. There may also be some local destinations where you can drop off your computer and wait to have a technician look at it. These options can often be costly, and pretty inconvenient. The answer to this question can probably be found doing a little extra research on Google.



A well-running computer can be a hard thing to maintain. From my experience, there is but only One software which is reputable- and consistently reliable for healing sick, slow computers. Reimageā„¢ is a world-renown, easy to use software designed by Forensic scientists and made for the average person. This thing will fix literally just about ANY problem you could possibly be having with your PC. Reimage was recommended to me by a Professor during my 2nd year of Graduate school.
Wanda
2016-02-23 21:39:43 UTC
What's A Trojan Virus, And How To Get Rid Of Them? -- https://reimagefix.im
anonymous
2009-08-30 13:26:50 UTC
http://en.wikipedia.org/wiki/Trojan_horse_%28computing%29



A Trojan horse, or trojan for short, is a term used to describe malware that appears, to the user, to perform a desirable function but, in fact, facilitates unauthorized access to the user's computer system



Larry Dougherty

HostMySite.com Server Engineer
?
2016-09-29 07:07:51 UTC
What Is The Trojan Virus
?
2016-08-25 17:56:30 UTC
2
?
2016-05-13 21:36:27 UTC
1
Shelton
2015-08-12 04:06:06 UTC
This Site Might Help You.



RE:

whats a trojan virus ?

so people whats a trojan viruse i need to know please tell me
Radoslaw P
2009-08-30 13:29:38 UTC
Trojan is malware program that's located on your hard disk and it can do various things that you as computer user can't detect, like send back info about your computer, usernames, passwords etc. It's not like virus, because viruses modify programs. The easiest way for you to get trojan is randomly clicking on internet banners, links etc.
Zeke Monroe
2009-08-30 13:28:24 UTC
It is bad juju. A trojan virus is a very nasty and sneaky malware that will eat your computer. I would suggest getting an anit-virus. Avast! is a free one, but be courteous and donate some money for them being there to help you out!
Ebay Power Seller
2009-08-30 13:44:55 UTC
A Trojan horse, or trojan for short, is a term used to describe malware that appears, to the user, to perform a desirable function but, in fact, facilitates unauthorized access to the user's computer system. The term comes from the Trojan Horse story in Greek mythology. Trojan horses are not self-replicating which distinguishes them from viruses and worms. Additionally, they require interaction with a hacker to fulfil their purpose. The hacker need not be the individual responsible for distributing the Trojan horse. It is possible for hackers to scan computers on a network using a port scanner in the hope of finding one with a Trojan horse installed[1]



Purpose of Trojan horses



Trojan horses are designed to allow a hacker remote access to a target computer system. Once a Trojan horse has been installed on a target computer system it is possible for a hacker to access it remotely and perform operations. The operations that a hacker can perform are limited by user privileges on the target computer system and the design of the Trojan horse itself.



Operations which could be performed by a hacker on a target computer system include:



* Use of the machine as part of a Botnet (e.g. to perform Distributed Denial-of-service (DDoS) attacks)

* Data Theft (e.g. passwords, security codes, credit card information)

* Installation of software (including other malware)

* Downloading of files

* Uploading of files

* Deletion of files

* Modification of files

* Keystroke logging

* Viewing the user's screen



Example



An example of a Trojan horse attack is one that was reported in 1999:



This Trojan horse was distributed using email. Reports suggest that it was widely distributed and that there were several versions. The email sent to distribute the Trojan horse purported to be from Microsoft Corporation and to offer a free upgrade for Microsoft Internet Explorer. The email did not originate from Microsoft Corporation nor did it provide an upgrade for Microsoft Internet Explorer. The Trojan horse was an executable file named "ie0199.exe" and was provided as an email attachment. One version of the email included the message:



As an user of the Microsoft Internet Explorer, Microsoft Corporation provides you with this upgrade for your web browser. It will fix some bugs found in your Internet Explorer. To install the upgrade, please save the attached file (ie0199.exe) in some folder and run it.



Once installed the Trojan horse reportedly modified system files and attempted to initiate contact with other remote systems.



Installation



* Software downloads (e.g. A Trojan horse included as part of a software application downloaded from File sharing networks)

* Websites containing executable content (e.g. A Trojan horse in the form of an ActiveX control)

* Email attachments

* Application exploits (Flaws in a web browser, media player, messaging client or other software which can be exploited to allow installation of a Trojan horse)

* Social Engineering (e.g. A hacker tricking a user into installing a Trojan horse by communicating with them directly)



Additionally, there have been reports of compilers which are themselves Trojan horses. In addition to compiling code to executable form they also insert code into the output executables which cause them to become Trojan horses. This is still distinct from self-replication as the process is not automatic.



Removal



Antivirus software is designed to detect and delete Trojan horses ideally preventing them from ever being installed. It may be possible to remove a Trojan horse manually given a full understanding of how that particular Trojan horse operates, however if it is possible that a Trojan horse has been used by a hacker to access a computer system it will be difficult to know what damage has been done and what other problems have been introduced. In situations where the security of the computer system is critical it is advisable to rebuild it from known good software.
Ethan
2009-08-30 13:34:20 UTC
A program that either does what it says or does something totally different.

A program that does what it says and is considered a trojan is a remote access program.Even though it is used for security purposes it can stiil be used to attack other computer.Then you have trojan downloaders which can download other malware to your system.There are even trojan password stealers for just about any program out there.Those are called psw trojans.

Now a virus is totally different than a trojan.Viruses can replicate,trojans cannot.Another words a trojan cannot send itself to others in your addressbook but a virus can.
anonymous
2016-03-13 11:11:08 UTC
In the context of computing and software, a Trojan horse, also known as a trojan, is malware that appears to perform a desirable function but in fact performs undisclosed malicious functions. Therefore, a computer worm or virus may be a Trojan horse. The term is derived from the classical story of the Trojan Horse. Trojan horse payloads are almost always designed to cause harm, but can also be harmless. They are classified based on how they breach and damage systems. The six main types of Trojan horse payloads are: * Remote Access * Data Destruction * Downloader * Server Trojan(Proxy, FTP , IRC, Email, HTTP/HTTPS, etc.) * Security software disabler * Denial-of-service attack (DoS)
pimpinator15
2009-08-30 13:34:51 UTC
A Trojan Horse or Trojan goes in through a back door in your firewall creating open ports that will exchange information between your computer and a main server. This unauthorized information such as credit card numbers, email passwords, checking accounts etc is useful to hackers. As long as you keep this information off of your computer and stay well protected with and Anti-virus program you will most likely be able to stay away from these vermin.
David K
2009-08-30 13:31:19 UTC
The name comes from the Greek Trojan Horse, where the gift of the horse statue to the city resulted in many soldiers invading the city. The trojan horse is one of the worst viruses because it downloads many other viruses to take over your computer. This makes trojan viruses some of the hardest to remove.
anonymous
2009-08-30 13:33:03 UTC
Trojan Horses can also use your PC as a jumping point for bots. These bots can infect other PCs.
jimi
2009-08-30 13:27:43 UTC
http://en.wikipedia.org/wiki/Trojan_horse_(computing)

http://www.tech-faq.com/trojan-horse-virus.shtml
anonymous
2009-08-30 13:30:09 UTC
Not very fun
jamie
2009-08-30 13:43:15 UTC
its like a keylogger


This content was originally posted on Y! Answers, a Q&A website that shut down in 2021.
Loading...