Trojan Horse

Trojan horse or Trojan horse, or better known as a Trojan in the computer security refers to a form of suspicious software (malicious software / malware) that can damage a system or network. The purpose of the Trojan is to obtain information from the target (passwords, user habits recorded in the system log, data, etc.), and control targets (obtain access rights on the target).

How it Works

Trojan different from the type of suspicious software such as computer viruses or worms because two of the following:

* Trojan is “stealth” (invisible and not seen) in its operations and are often shaped as if the program is a good program, while a computer virus or worm to act more aggressively to the detriment of the system or create a system to crash.
* Trojan does not replicate itself, while computer viruses and worms do.
* In general, a Trojan is not dangerous as long as the user is not connected to the Internet or network. Because the Trojan is controlled from another computer (the computer the attacker).

How to Spread

The use of the term Trojan or Trojan horse designed to infiltrate suspicious codes and damage in a good program and useful; as well as in the Trojan War, the Spartan soldiers hiding inside the Trojan Horse is intended as a dedication to Poseidon. The Trojan horse of Troy according to officials deemed harmless, and allowed to enter the citadel of Troy is not penetrated by Greek soldiers for about 10 years of turbulent Trojan war.

Most Trojans now form an executable file (*. EXE or *. COM in the Windows operating system and DOS or programs with names that are often executed in the UNIX operating system, such as ls, cat, etc.) are included in the systems penetrated by a cracker to steal important data for the user (password, credit card data, etc.). Trojans can also infect the system when users download the application (often a computer game) from a source that can not be trusted in Internet network. These applications can have a backdoor Trojan code integrated within itself and allow a cracker to be able to mess up the system in question.

Trojan Types

Several types of Trojans in circulation include:

* Thieves password: Type Trojan can find passwords that are stored in the operating system (/ etc / passwd or / etc / shadow in the family or the UNIX operating system files Security Accounts Manager (SAM) in the family of Windows NT operating system) and will send it to The original attacker. In addition, this type of Trojan can also trick users by making the display as if he is the login screen (/ sbin / login on UNIX operating systems or Winlogon.exe in the Windows NT operating system) and wait for the user to enter a password and send it to attackers. Examples of this type is a Trojan Passfilt act as if he were the original Passfilt.dll file used to add security passwords in the Windows NT operating system, but the abused becomes a password thief program.
* Register your keystrokes (keystroke logger / keylogger): This type of Trojan will monitor all typed by the user and will send it to attackers. These different types of spyware, although the two things that do similar things (to spy on users).
* Remote Administration Tool (Remote Administration Tools / RAT): This type of Trojan allows attackers to take over full control of the system and do whatever they want from a distance, such as formatting the hard disk, steal or delete data, etc. . Examples of this Trojan is Back Orifice, Back Orifice 2000, and SubSeven.
* Zombie DDoS Trojan or Trojan: Trojan type is used to make the infected system in order to attack a distributed denial of service against the target host.
* There is more a kind of Trojan mengimbuhkan itself to a program to modify the workings of diimbuhinya program. This type of Trojan known as Trojan viruses.

also visit our other blogs at find the best tricks and tips for your computer


Leave a comment

No comments yet.

Comments RSS TrackBack Identifier URI

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s