Oppenheimer Film Discussion for Philosophy and Film
Torjan horse virus
1.
2. VIRUS
TROJAN HOURSE
PURPOSE AND USAGE
CURRENT USAGE
COMMON TROJANS HORSE
RECENT INNOVATION IN TROJAN
SECURITY FROM
TROJAN PROJECT INFORMATION
3.
A computer virus is a computer program that replicate
itself and spread from one computer to another.
The term "virus" is also erroneously, used to refer types
of malware, including adware and spyware programs
that don’t replicate .
Malware (malicious software) are used disrupt
computer operation, gather sensitive information, or
gain access to pc’s systems.
Many active malware threats are trojans or worms than
viruses. Trojan horses and worms are confused with
viruses.
4.
The term is derived from Greek mythology .
Trojans are non-self-replicating type of
malware which appears to perform a desirable
function.
Instead it facilitates unauthorized access to the
user's computer system.
Do not attempt to inject themselves into other
files like computer virus.
Trojans may use drive-by downloads or install
via online games ,internet-driven applications
In order to reach target computers.
5.
Trojan can hacker remote access to targeted computer
system.
Operations that could be performed by a hacker on a
targeted computer system may include:
Use of the machine as part of a botnet.
Crashing the computer
Blue screen of death
Electronic money theft
Data theft (e.g. retrieving passwords or credit card
information)
Installation of software, including third-party malware and
ransomware
Downloading or uploading of files on the user's computer
Modification or deletion of files
Keystroke logging
Watching the user's screen
6.
Botnets popularity and availability of advertising
services permit authors to violate their users' privacy.
Trojan horses are becoming more common.
survey conducted by BitDefender (2009) "Trojan-type
malware are 83-percent of the global.
spreads with help of worms and travel across the
internet with them.
main purpose to make host system open to access
through the internet.
BitDefender states approximately 15% of computers
are members of a botnet (Trojan infection)
7. Netbus (by Carl-Fredrik Neikter)
Subseven or Sub7(by Mobman)
Back Orifice (Sir Dystic)
Beast
Zeus
The Blackhole exploit kit[11]
Flashback Trojan (Trojan
BackDoor.Flashback)
ProRat
ZeroAccess
8.
its code takes advantage of a security flaw of
Internet Explorer and Google Chrome .
use host computer as an anonymizer proxy to
hide internet usage.
hacker can view internet sites tracking
cookies, internet history, any IP logging.
host's computer may show the internet history
using effected computer as proxy.
Newer generations of Trojans tend to "cover"
olders tracks leaving tracks on viewed page.
the most widely distributed eg such type of
Trojan horse are SUB7.
9. Use good antivirus
Always scan files emails before opening
to your system
Trojans can be far more harmful than
viruses,
Use trojans controllers.
Never open scam emails.
Delete .exe files not from authorized sites.
10. Our project describes working of a
simple trojan.
This trojan crupts window os .
It places junk file in c drive to fill hardisk
space
Its undetected by antivirus
Damage can be restore by deleting .dll
file from c drive.