Monday, August 31, 2009

Trojan Types


Again, just as with viruses and worms, there are many types of Trojan programs - the most popular being “Back Orifice”, “Netbus” and “SubSeven”. Depending on the type of trojan installed and the motives of someone who gains access to an infected machine, the results can be disastrous: trojans can allow someone to see what you are seeing (on their screen), to transfer files from your computer to theirs, to delete your files and crash your computer, to use keyloggers to track (log) what you type in order to steal passwords/bank account/credit card info, to open and close CD-ROM drives, take control of your mouse, turn the machine and monitor on/off, and much more.

Almost all trojans will attempt to open a “port” (metaphorically, an open port is like an open door to a house) to broadcast the presence of an infected machine to “port scanners” (people looking for open ports on infected machines, to break into). Some trojans are also programmed to establish a direct connection to a specific person/computer, or to commit illegal DoS (Denial of Service) attacks on specific websites. Firewalls (see futher in this document) are particularly useful to block Trojans from trying to access the Internet, and from people trying to gain access to your machine.

No comments:

Post a Comment

Hi thank you for comment in Assignment Lanka " Book Mark on me' To future references.

Tag

Assignment Lanka Tag Cloud
Computer Networks The History of Local Area Networks, LAN, The Topologies of a Networks, LANs describe different types of transmission Medias, Local Area Networks Access Methods, Carrier Sense Multiple Access with Collision Detect, Development of LAN Technologies. LAN -Token Ring, LAN Ethernet Digital, LAN - Ethernet Sun microsystems, LAN - Ethernet Mixed Environment, LAN - Token Ring was introduced by IBM LAN - IBM implementation of Token Ring, Token Ring Novell, LAN Token Ring - in a mixed environment, LAN - Fiber Distributed Data Interface, LAN - ATM, LAN Components, LAN Switching Methods, Virtual Local Area Network, Port based VLAN, Mac based VLAN, Protocol based VLAN, User Base VLAN, PC networks Components, PC networks Shared resources, PC Network operating systems, PC networks Novell Netware, PC networks Windows NT, PC networks IBM LAN Server Computer Programming Languages HTML Language, The Generations of Programming Languages, Different types of High Level Languages, Different types of High Level Languages Disadvantages
Computer Networks - IBM LAN Server, Windows NT Networks, Novell Netware, Network operating systems, Networks Shared, Networks Components, User Base, Protocol based, Mac based, Port based, VLAN, LAN Switching, LAN Components, ATM, Fiber Data, Token Ring, Token Ring Novell, IBM implementation, Ethernet, Sun microsystems, Ethernet Digital, Token passing, LAN Technologies, CSMA/CD, Access Methods, Transmission, Networks, The History of Local Area Networks, LAN