EssaysForStudent.com - Free Essays, Term Papers & Book Notes
Search

Computer Trojan

By:   •  Research Paper  •  9,890 Words  •  February 5, 2010  •  815 Views

Page 1 of 40

Join now to read essay Computer Trojan

Table of Contents

-----------------

01.What Is This Paper About

02.What Is A Trojan Horse

03.How Do Trojans Work

04.Trojans Variations

-Remote Access Trojans

-Password Sending Trojans

-Keylogging Trojans

-Destructive Trojans

-Denial Of Service (DoS) Attack Trojans

-Proxy/Wingate Trojans

-FTP Trojans

-Detection Software Killers

05.The Future Of Windows Trojans

06.How Can I Get Infected

-Via ICQ

-Via IRC

-Via Attachments

-Via Physical Access

-Via Browser And E-mail Software Bugs

-Via Netbios(File Sharing)

07.Fake Programs

08.Untrusted Sites And FreeWare Software

09.How Are They Detecting My Internet Presence

10.What Is The Attacker Looking For

11.Intelligence With Trojans

12.Trojan Ports

13.How Do I Know I'm Infected

14.Anti-Virus (AV) Scanners

15.Anti-Trojan Software

16.After You Clean Yourself

17.Online Scanning Services

18.Advice

19.Links Section

20.Final Words

-------------------------------------------------------------------------------

1.What is this paper about?

-------------------------

The Complete Trojans Text is a paper about Windows Trojans, how they work,

their variations and, of course, strategies to minimise the risk of infection.

Links to special detection software are included as well as many other topics

never discussed before. This paper is not only intended to be for the average

Internet/Windows user who wants to know how to protect his/her machine from

Trojan Horses or just want to know about their usage, variations, prevention

and future, but will also be interesting for the advanced user, to read

another point of view.

Windows Trojans are just a small aspect of Windows Security but you will soon

realise how dangerous and destructive they could be while reading the paper.

2.What Is A Trojan Horse?

-----------------------

A Trojan horse is:

- An unauthorised program contained within a legitimate program. This

unauthorised program performs functions unknown (and probably unwanted) by

the user.

- A legitimate program that has been altered by the placement of unauthorised

code within it; this code performs functions unknown (and probably unwanted)

by the user.

- Any program that appears to perform a desirable and necessary function but

that (because of unauthorised code within it that is unknown to the user)

performs functions unknown (and definitely unwanted) by the user.

The Trojan Horse got its name from the old mythical story about how the

Greeks gave their

Download as (for upgraded members)  txt (63.6 Kb)   pdf (720.1 Kb)   docx (47.6 Kb)  
Continue for 39 more pages »