Computer Trojan
By: Artur • Research Paper • 9,890 Words • February 5, 2010 • 815 Views
Join now to read essay Computer Trojan
Table of Contents
-----------------
01.What Is This Paper About
02.What Is A Trojan Horse
03.How Do Trojans Work
04.Trojans Variations
-Remote Access Trojans
-Password Sending Trojans
-Keylogging Trojans
-Destructive Trojans
-Denial Of Service (DoS) Attack Trojans
-Proxy/Wingate Trojans
-FTP Trojans
-Detection Software Killers
05.The Future Of Windows Trojans
06.How Can I Get Infected
-Via ICQ
-Via IRC
-Via Attachments
-Via Physical Access
-Via Browser And E-mail Software Bugs
-Via Netbios(File Sharing)
07.Fake Programs
08.Untrusted Sites And FreeWare Software
09.How Are They Detecting My Internet Presence
10.What Is The Attacker Looking For
11.Intelligence With Trojans
12.Trojan Ports
13.How Do I Know I'm Infected
14.Anti-Virus (AV) Scanners
15.Anti-Trojan Software
16.After You Clean Yourself
17.Online Scanning Services
18.Advice
19.Links Section
20.Final Words
-------------------------------------------------------------------------------
1.What is this paper about?
-------------------------
The Complete Trojans Text is a paper about Windows Trojans, how they work,
their variations and, of course, strategies to minimise the risk of infection.
Links to special detection software are included as well as many other topics
never discussed before. This paper is not only intended to be for the average
Internet/Windows user who wants to know how to protect his/her machine from
Trojan Horses or just want to know about their usage, variations, prevention
and future, but will also be interesting for the advanced user, to read
another point of view.
Windows Trojans are just a small aspect of Windows Security but you will soon
realise how dangerous and destructive they could be while reading the paper.
2.What Is A Trojan Horse?
-----------------------
A Trojan horse is:
- An unauthorised program contained within a legitimate program. This
unauthorised program performs functions unknown (and probably unwanted) by
the user.
- A legitimate program that has been altered by the placement of unauthorised
code within it; this code performs functions unknown (and probably unwanted)
by the user.
- Any program that appears to perform a desirable and necessary function but
that (because of unauthorised code within it that is unknown to the user)
performs functions unknown (and definitely unwanted) by the user.
The Trojan Horse got its name from the old mythical story about how the
Greeks gave their