Computer Viruses, Worms, and Trojan Horses Explained
- Author Michael Styles
- Published April 16, 2011
- Word count 452
A Trojan horse is a destructive computer program that masquerades as a valuable or entertaining tool. It claims to perform a desirable function, but in fact damages your computer system when it is run. A Trojan horse can be a virus or a remote control program. They are usually installed on a computer through an e-mail attachment.
The term is derived from the Trojan Horse story in Greek mythology. In this story, the Greeks give a giant wooden horse to their enemy, the Trojans, apparently as a peace offering. But after the Trojans drag the horse inside their city walls, Greek soldiers sneak out of the horse's hollow belly and open the city gates, allowing their compatriots to pour in and capture Troy.
Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most crafty types of Trojan horse is a program that claims to rid a computer of viruses but instead introduces viruses onto the computer.
Back Orifice is a famous example of a Trojan Horse, written to demonstrate the lack of security in Microsoft Windows 98. It was the brainchild of Sir Dystic, a member of the U.S. hacker organization CULT OF THE DEAD COW. It was designed for remote system administration, based on a client-server architecture, allowing a user to control a computer running Microsoft Windows from a remote location (much like Microsoft's Remote Desktop Connection software). This required two components to work -- a client application running on the attacker's computer and a server application running on the victim's computer. Once installed, the attacker can perform any number of tasks on the victim's computer, including transferring files to and from the victim's machine, crashing the computer, data theft, installation of software including malware, and keystroke logging for the purpose of acquiring user ids and passwords. Back Orifice 2000, the sequel to Back Orifice, was later released and could run on Windows NT machines.
Another notable Trojan horse is called SubSeven. It was designed to attack computers running Microsoft Windows 95 and Windows 98. It is also similar in architecture to Back Orifice, but with a third component called a server editor (EditServer), which allowed the attacker to configure the infection. It provides many more options for attack than Back Orifice, however, allowing an attacker to issue virtually any command imaginable on a compromised system.
Trojan horses are becoming more and more common. According to a survey conducted by BitDefender from January to June 2009, "Trojan-type malware is on the rise, accounting for 83-percent of the global malware detected in the world". This virus has a relationship with worms as it spreads with the help given by worms and travel across the Internet with them.
Visit digital-products.ca for digital products and services from several different categories including software, e-books, games, utilities, reference material, and services. You'll also find several informative articles and videos on some of the products offered.
Article source: https://articlebiz.comRate article
Article comments
There are no posted comments.
Related articles
- “Shadowland: The Tragic Ordeal of Frances Farmer and the Machinery That Broke Her.”
- “Glenn Ford: Hollywood’s Reluctant Heartthrob Who Played by His Own Rules.”
- “From Navy Tough Guy to Hollywood Everyman: The Life and Legacy of Ernest Borgnine.”
- Nancy Meyers-Inspired Kitchen: California Casual with Vintage Carved Door Charm
- Yellowstone-Inspired Ranch Farmhouse Style: Rugged Elegance with Rustic Antique Doors
- Used Master Prime Inspection: 5 Critical Checks to Avoid Refurbished Scams
- Staying Charged: A Guide to Electrolyte Balance for Health and Exercise
- Creating a Profitable Business with PLR Planners and Printables
- How to Spend 48 Hours in Cape Town: A Quick Itinerary
- “Wounds That Time Couldn’t Heal: Watching The Best Years of Our Lives Through the Lens of Memory and Mourning.”
- Understanding an ACL Tear
- Top 5 Funniest Gag Gifts for Your Best Friend
- Why Second Hand Pianos for Sale Are a Smart Investment
- Finding the Right Piano Shop Near Me: A Guide to Second Hand Pianos
- “Mira Sorvino: From Oscar Glory to Hollywood Silence.”
- Ireland Sino Institute Launches 2025 China Internship Program
- “Beyond the Spotlight: The Rise and Fall of Dorothy Dandridge.”
- “Through the Mist of Venice: Revisiting Don’t Look Now and Its Haunting Grip on Grief.”
- The Art of Coaching: Cultivating Growth and Inspiration
- Creating a Holistic Backyard Retreat: Old World Elegance Meets Nature
- Understanding T1 and T2 Transit Documents in EU: Your Complete Guide
- Cryptonews.money: Your Ultimate Guide to Understanding Cryptocurrency
- 15 Basketball Dribbling Games and Passing Drills for Better Ball Handling
- Transdermal Progesterone Cream: Benefits for Hot Flashes and Menopause Symptoms
- Tepezcohuite: The Ancient Skin Health Secret You Need to Know
- Quiet Cars and Busy Calendars: The Overlooked Role of Chauffeurs in Post-July Corporate Travel
- 1031 Exchange
- Breaking Karmic Cycles, Creating a Shiva Altar with Deity Carvings and Sculptures from Mogul Interior
- The Art of Whimsical Carved Wall Art & Eclectic Décor
- “Hellfire and Heresy: Ken Russell’s The Devils and the Fury of Sacred Cinema.”