SlideShare une entreprise Scribd logo
1  sur  11
VIRUS
 TROJAN HOURSE
 PURPOSE AND USAGE
 CURRENT USAGE
 COMMON TROJANS HORSE
 RECENT INNOVATION IN TROJAN
 SECURITY FROM
 TROJAN PROJECT INFORMATION



A computer virus is a computer program that replicate
itself and spread from one computer to another.



The term "virus" is also erroneously, used to refer types
of malware, including adware and spyware programs
that don’t replicate .



Malware (malicious software) are used disrupt
computer operation, gather sensitive information, or
gain access to pc’s systems.



Many active malware threats are trojans or worms than
viruses. Trojan horses and worms are confused with
viruses.








The term is derived from Greek mythology .
Trojans are non-self-replicating type of
malware which appears to perform a desirable
function.
Instead it facilitates unauthorized access to the
user's computer system.
Do not attempt to inject themselves into other
files like computer virus.
Trojans may use drive-by downloads or install
via online games ,internet-driven applications
In order to reach target computers.














Trojan can hacker remote access to targeted computer
system.
Operations that could be performed by a hacker on a
targeted computer system may include:
Use of the machine as part of a botnet.
Crashing the computer
Blue screen of death
Electronic money theft
Data theft (e.g. retrieving passwords or credit card
information)
Installation of software, including third-party malware and
ransomware
Downloading or uploading of files on the user's computer
Modification or deletion of files
Keystroke logging
Watching the user's screen








Botnets popularity and availability of advertising
services permit authors to violate their users' privacy.
Trojan horses are becoming more common.
survey conducted by BitDefender (2009) "Trojan-type
malware are 83-percent of the global.
spreads with help of worms and travel across the
internet with them.
main purpose to make host system open to access
through the internet.
BitDefender states approximately 15% of computers
are members of a botnet (Trojan infection)
Netbus (by Carl-Fredrik Neikter)
Subseven or Sub7(by Mobman)
Back Orifice (Sir Dystic)
Beast
Zeus
The Blackhole exploit kit[11]
Flashback Trojan (Trojan
BackDoor.Flashback)
 ProRat
 ZeroAccess














its code takes advantage of a security flaw of
Internet Explorer and Google Chrome .
use host computer as an anonymizer proxy to
hide internet usage.
hacker can view internet sites tracking
cookies, internet history, any IP logging.
host's computer may show the internet history
using effected computer as proxy.
Newer generations of Trojans tend to "cover"
olders tracks leaving tracks on viewed page.
the most widely distributed eg such type of
Trojan horse are SUB7.
Use good antivirus
 Always scan files emails before opening
to your system
 Trojans can be far more harmful than
viruses,
 Use trojans controllers.
 Never open scam emails.
 Delete .exe files not from authorized sites.

Our project describes working of a
simple trojan.
 This trojan crupts window os .
 It places junk file in c drive to fill hardisk
space
 Its undetected by antivirus
 Damage can be restore by deleting .dll
file from c drive.

Torjan horse virus

Contenu connexe

Tendances (20)

Web security
Web securityWeb security
Web security
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoors
 
Spam, security
Spam, securitySpam, security
Spam, security
 
Malware
MalwareMalware
Malware
 
Malware
MalwareMalware
Malware
 
Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testing
 
Social Engineering new.pptx
Social Engineering new.pptxSocial Engineering new.pptx
Social Engineering new.pptx
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
 
Api security-testing
Api security-testingApi security-testing
Api security-testing
 
A5: Security Misconfiguration
A5: Security Misconfiguration A5: Security Misconfiguration
A5: Security Misconfiguration
 
DDOS Attack
DDOS Attack DDOS Attack
DDOS Attack
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Email threats
Email threatsEmail threats
Email threats
 
Ransomware by lokesh
Ransomware by lokeshRansomware by lokesh
Ransomware by lokesh
 
Bug Bounty Secrets
Bug Bounty Secrets Bug Bounty Secrets
Bug Bounty Secrets
 
Dos attack
Dos attackDos attack
Dos attack
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
Frans Rosén Keynote at BSides Ahmedabad
Frans Rosén Keynote at BSides AhmedabadFrans Rosén Keynote at BSides Ahmedabad
Frans Rosén Keynote at BSides Ahmedabad
 

En vedette

Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan100701982
 
How a Credit Union Can Stay Off the CFPB's Radar
How a Credit Union Can Stay Off the CFPB's RadarHow a Credit Union Can Stay Off the CFPB's Radar
How a Credit Union Can Stay Off the CFPB's RadarSilver cloud
 
AMA SUNDAY NIGHT AUCTION 12/29/2013 JEWELRY MAKING SUPPLIES
AMA SUNDAY NIGHT AUCTION 12/29/2013 JEWELRY MAKING SUPPLIESAMA SUNDAY NIGHT AUCTION 12/29/2013 JEWELRY MAKING SUPPLIES
AMA SUNDAY NIGHT AUCTION 12/29/2013 JEWELRY MAKING SUPPLIESmrsbubba33
 
GelecekHane - Endüstri 2.0 Konferansı: Halil Aksu - Kapanış Sunumu
GelecekHane - Endüstri 2.0 Konferansı: Halil Aksu - Kapanış SunumuGelecekHane - Endüstri 2.0 Konferansı: Halil Aksu - Kapanış Sunumu
GelecekHane - Endüstri 2.0 Konferansı: Halil Aksu - Kapanış SunumuGelecek Hane
 
Top10 Trends 2015 - GelecekHane
Top10 Trends 2015 - GelecekHaneTop10 Trends 2015 - GelecekHane
Top10 Trends 2015 - GelecekHaneGelecek Hane
 
Economic Industries!
Economic Industries!Economic Industries!
Economic Industries!Sanjam Kanwar
 
GelecekHane Ticaret 2.0 -Akan Abdula - Davranış Enstitüsü
GelecekHane Ticaret 2.0 -Akan Abdula - Davranış EnstitüsüGelecekHane Ticaret 2.0 -Akan Abdula - Davranış Enstitüsü
GelecekHane Ticaret 2.0 -Akan Abdula - Davranış EnstitüsüGelecek Hane
 
Proyecto de investigación: Amazing animals and_plants
Proyecto de investigación: Amazing animals and_plantsProyecto de investigación: Amazing animals and_plants
Proyecto de investigación: Amazing animals and_plantsmjuanalcaide
 
ITFT - Famous wild life sancturies
ITFT - Famous wild life sancturiesITFT - Famous wild life sancturies
ITFT - Famous wild life sancturiesAnuj Tomar
 
Ailing planet; the green movements role
Ailing planet; the green movements roleAiling planet; the green movements role
Ailing planet; the green movements roleMohammed Suhail
 
khidmat masyarakat dan penjelajahan lasak PRIME
khidmat masyarakat dan penjelajahan lasak PRIMEkhidmat masyarakat dan penjelajahan lasak PRIME
khidmat masyarakat dan penjelajahan lasak PRIMEKamil Mieyl
 
November 2013 Corporate Presentation
November 2013 Corporate PresentationNovember 2013 Corporate Presentation
November 2013 Corporate Presentationoncolyticsinc
 
Go green curb global warming
Go green curb global warmingGo green curb global warming
Go green curb global warmingMohammed Suhail
 
May 2016 Corporate Presentation
May 2016 Corporate PresentationMay 2016 Corporate Presentation
May 2016 Corporate Presentationoncolyticsinc
 
Gelecek hane perspektif-raporu-subat-2015
Gelecek hane perspektif-raporu-subat-2015Gelecek hane perspektif-raporu-subat-2015
Gelecek hane perspektif-raporu-subat-2015Gelecek Hane
 
Cantabrian mountains
Cantabrian mountains Cantabrian mountains
Cantabrian mountains mjuanalcaide
 
Teorias de la personalidad
Teorias de la personalidadTeorias de la personalidad
Teorias de la personalidadJenny Rojas
 

En vedette (20)

Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
How a Credit Union Can Stay Off the CFPB's Radar
How a Credit Union Can Stay Off the CFPB's RadarHow a Credit Union Can Stay Off the CFPB's Radar
How a Credit Union Can Stay Off the CFPB's Radar
 
AMA SUNDAY NIGHT AUCTION 12/29/2013 JEWELRY MAKING SUPPLIES
AMA SUNDAY NIGHT AUCTION 12/29/2013 JEWELRY MAKING SUPPLIESAMA SUNDAY NIGHT AUCTION 12/29/2013 JEWELRY MAKING SUPPLIES
AMA SUNDAY NIGHT AUCTION 12/29/2013 JEWELRY MAKING SUPPLIES
 
GelecekHane - Endüstri 2.0 Konferansı: Halil Aksu - Kapanış Sunumu
GelecekHane - Endüstri 2.0 Konferansı: Halil Aksu - Kapanış SunumuGelecekHane - Endüstri 2.0 Konferansı: Halil Aksu - Kapanış Sunumu
GelecekHane - Endüstri 2.0 Konferansı: Halil Aksu - Kapanış Sunumu
 
Top10 Trends 2015 - GelecekHane
Top10 Trends 2015 - GelecekHaneTop10 Trends 2015 - GelecekHane
Top10 Trends 2015 - GelecekHane
 
Economic Industries!
Economic Industries!Economic Industries!
Economic Industries!
 
MapReduce and Hadoop
MapReduce and HadoopMapReduce and Hadoop
MapReduce and Hadoop
 
Par2012
Par2012Par2012
Par2012
 
GelecekHane Ticaret 2.0 -Akan Abdula - Davranış Enstitüsü
GelecekHane Ticaret 2.0 -Akan Abdula - Davranış EnstitüsüGelecekHane Ticaret 2.0 -Akan Abdula - Davranış Enstitüsü
GelecekHane Ticaret 2.0 -Akan Abdula - Davranış Enstitüsü
 
Proyecto de investigación: Amazing animals and_plants
Proyecto de investigación: Amazing animals and_plantsProyecto de investigación: Amazing animals and_plants
Proyecto de investigación: Amazing animals and_plants
 
ITFT - Famous wild life sancturies
ITFT - Famous wild life sancturiesITFT - Famous wild life sancturies
ITFT - Famous wild life sancturies
 
Ailing planet; the green movements role
Ailing planet; the green movements roleAiling planet; the green movements role
Ailing planet; the green movements role
 
khidmat masyarakat dan penjelajahan lasak PRIME
khidmat masyarakat dan penjelajahan lasak PRIMEkhidmat masyarakat dan penjelajahan lasak PRIME
khidmat masyarakat dan penjelajahan lasak PRIME
 
November 2013 Corporate Presentation
November 2013 Corporate PresentationNovember 2013 Corporate Presentation
November 2013 Corporate Presentation
 
Go green curb global warming
Go green curb global warmingGo green curb global warming
Go green curb global warming
 
May 2016 Corporate Presentation
May 2016 Corporate PresentationMay 2016 Corporate Presentation
May 2016 Corporate Presentation
 
Gelecek hane perspektif-raporu-subat-2015
Gelecek hane perspektif-raporu-subat-2015Gelecek hane perspektif-raporu-subat-2015
Gelecek hane perspektif-raporu-subat-2015
 
Nike
Nike Nike
Nike
 
Cantabrian mountains
Cantabrian mountains Cantabrian mountains
Cantabrian mountains
 
Teorias de la personalidad
Teorias de la personalidadTeorias de la personalidad
Teorias de la personalidad
 

Similaire à Torjan horse virus

Internet Security
Internet SecurityInternet Security
Internet SecurityManoj Sahu
 
Ids 007 trojan horse
Ids 007 trojan horseIds 007 trojan horse
Ids 007 trojan horsejyoti_lakhani
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan BackdoorsJauwadSyed
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spywaremissstevenson01
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoorsseth edmond
 
Network security .pptx
Network security .pptxNetwork security .pptx
Network security .pptxAvinash627658
 
What is Malware (Antivirus)
What is Malware (Antivirus)What is Malware (Antivirus)
What is Malware (Antivirus)Paras Intotech
 
Presentation24190
Presentation24190Presentation24190
Presentation24190KRT395
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoorsShrey Vyas
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptxAbiniyavk
 
The trojan horse virus
The trojan horse virusThe trojan horse virus
The trojan horse virusHTS Hosting
 
Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilitiesricharddxd
 
Ahmad Pussycat Dolls
Ahmad Pussycat DollsAhmad Pussycat Dolls
Ahmad Pussycat Dollsmastermind07
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES Sagilasagi1
 

Similaire à Torjan horse virus (20)

Internet Security
Internet SecurityInternet Security
Internet Security
 
Ids 007 trojan horse
Ids 007 trojan horseIds 007 trojan horse
Ids 007 trojan horse
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan Backdoors
 
Information security
Information securityInformation security
Information security
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spyware
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoors
 
Trojan Virus.pptx
Trojan Virus.pptxTrojan Virus.pptx
Trojan Virus.pptx
 
Network security .pptx
Network security .pptxNetwork security .pptx
Network security .pptx
 
What is Malware (Antivirus)
What is Malware (Antivirus)What is Malware (Antivirus)
What is Malware (Antivirus)
 
Presentation24190
Presentation24190Presentation24190
Presentation24190
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
The trojan horse virus
The trojan horse virusThe trojan horse virus
The trojan horse virus
 
Presentation2
Presentation2Presentation2
Presentation2
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilities
 
Dickmaster
DickmasterDickmaster
Dickmaster
 
Ahmad Pussycat Dolls
Ahmad Pussycat DollsAhmad Pussycat Dolls
Ahmad Pussycat Dolls
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
virus
  virus  virus
virus
 

Dernier

How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
TEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxTEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxruthvilladarez
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 

Dernier (20)

How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
TEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxTEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docx
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 

Torjan horse virus

  • 1.
  • 2. VIRUS  TROJAN HOURSE  PURPOSE AND USAGE  CURRENT USAGE  COMMON TROJANS HORSE  RECENT INNOVATION IN TROJAN  SECURITY FROM  TROJAN PROJECT INFORMATION 
  • 3.  A computer virus is a computer program that replicate itself and spread from one computer to another.  The term "virus" is also erroneously, used to refer types of malware, including adware and spyware programs that don’t replicate .  Malware (malicious software) are used disrupt computer operation, gather sensitive information, or gain access to pc’s systems.  Many active malware threats are trojans or worms than viruses. Trojan horses and worms are confused with viruses.
  • 4.       The term is derived from Greek mythology . Trojans are non-self-replicating type of malware which appears to perform a desirable function. Instead it facilitates unauthorized access to the user's computer system. Do not attempt to inject themselves into other files like computer virus. Trojans may use drive-by downloads or install via online games ,internet-driven applications In order to reach target computers.
  • 5.             Trojan can hacker remote access to targeted computer system. Operations that could be performed by a hacker on a targeted computer system may include: Use of the machine as part of a botnet. Crashing the computer Blue screen of death Electronic money theft Data theft (e.g. retrieving passwords or credit card information) Installation of software, including third-party malware and ransomware Downloading or uploading of files on the user's computer Modification or deletion of files Keystroke logging Watching the user's screen
  • 6.       Botnets popularity and availability of advertising services permit authors to violate their users' privacy. Trojan horses are becoming more common. survey conducted by BitDefender (2009) "Trojan-type malware are 83-percent of the global. spreads with help of worms and travel across the internet with them. main purpose to make host system open to access through the internet. BitDefender states approximately 15% of computers are members of a botnet (Trojan infection)
  • 7. Netbus (by Carl-Fredrik Neikter) Subseven or Sub7(by Mobman) Back Orifice (Sir Dystic) Beast Zeus The Blackhole exploit kit[11] Flashback Trojan (Trojan BackDoor.Flashback)  ProRat  ZeroAccess       
  • 8.       its code takes advantage of a security flaw of Internet Explorer and Google Chrome . use host computer as an anonymizer proxy to hide internet usage. hacker can view internet sites tracking cookies, internet history, any IP logging. host's computer may show the internet history using effected computer as proxy. Newer generations of Trojans tend to "cover" olders tracks leaving tracks on viewed page. the most widely distributed eg such type of Trojan horse are SUB7.
  • 9. Use good antivirus  Always scan files emails before opening to your system  Trojans can be far more harmful than viruses,  Use trojans controllers.  Never open scam emails.  Delete .exe files not from authorized sites. 
  • 10. Our project describes working of a simple trojan.  This trojan crupts window os .  It places junk file in c drive to fill hardisk space  Its undetected by antivirus  Damage can be restore by deleting .dll file from c drive. 