answersLogoWhite

Top Answer
User Avatar
Wiki User
Answered
2012-11-01 10:04:10
2012-11-01 10:04:10

'you need a Trojan horse to create a Trojan virus'

LOL , Trojan Horse itself is a Virus !

001
๐Ÿฆƒ
0
๐Ÿคจ
0
๐Ÿ˜ฎ
0
๐Ÿ˜‚
0

Related Questions


If the virus are all in the virus vault, you are safe. i would recommend running a scan for more viruses. then if there aen't any you can safly remove the viruses. but before you do, make sure they didn't infect any important files.



If you have these viruses i suggest you get rid of them A Trojan is a virus that tries to install itself on your computer and take up space A script virus can be located in the hardest to find spots so make sure you run full scans regularly I hope this anwer has helped


you have to have the laptops name if the person does have file sharing you can hack easily. It is also easy if you know the person. Create a Trojan virus then put it onto the laptop. The Trojan virus will make it so you can hack it easily.


One of the main ways to remove a trojan virus is to constantly update your antivirus software to make sure that it always is protecting your computer from any viruses that could get its way into your computer.


well yes and no. hackers will be the ones who make the virus. depending on what virus it is. if it is a Trojan it is most likely done by a hacker because the virus itself steals information and gives control to your computer.


It can # make the computer slow # cause popup # steal passwords # cause errors



A Trojan Horse Virus is a common yet difficult to remove computer threat. This is a type of virus that attempts to make the user think that it is a beneficial application. A Trojan Horse virus works by hiding within a set of seemingly useful software programs. Once executed or installed in the system, this type of virus will start infecting other files in the computer. A Trojan Horse Virus is also usually capable of stealing important information from the user's computer. It will then send this information to Internet servers designated by the developer of the virus. The developer will then be able to gain a level of control over the computer through this Trojan virus. While these things take place, the user will notice that the infected computer has become very slow or unexpected windows pop up without any activity from the user. Later on, this will result to a computer crash. A Trojan Horse virus can spread in a number of ways. The most common means of infection is through email attachments. The developer of the virus usually uses various spamming techniques in order to distribute the virus to unsuspecting users. These emails contain attachments. Once the user opens the attachment, the Trojan Horse Virus immediately infects the system and performs the tasks mentioned above. Another method used by malware developers to spread their Trojan Horse viruses is via chat software such as Skype. Another method used by this virus in order to infect other machines is through sending copies of itself to the people in the address book of a user whose computer has already been infected by the virus. The best way to prevent a Trojan Horse Virus from entering and infecting your computer is to never open email attachments or files that have been sent by unknown senders. However, not all files we can receive are guaranteed to be virus-free. With this, a good way of protecting your PC against malicious programs such as this harmful application is to install and update an antivirus program.


A running java program only has access to the memory allocated to it by the Java Runtime Environment. Java by design does not allow access to absolute memory locations which is required to scan for memory resident viruses. A Java-based anti-virus program can still read a virus-signature file and use it to scan for those patterns in files to identify possible infected files.


Trojan horse- It is a program, using this program it will make the victim system to make listen on particular port, so that attacker can do anything on your system, i.e. he can tamper with, steal, and destroy the data etc...., a Trojan horse wont spread in to the system like a virus so it won't effect the system performance. virus- It is a malicious program, using this program it will damage your system, by injecting the virus in to another programs are files, so that it will regrade your system performance. Virus will come to the system with user interaction only. worm- It is also one type of virus, using this program it will damage your system like virus, not only system it will spread through out the network and checks for honey pot of your os, and enter into the os, it will regrade your system performance and also it will eat your network bandwidth.


Java is a programming language, you can use ANY programming language to make exploits to ... exploit one's system. As of today, I have seen numerous amounts of ways to be infected by Java. For example, the java drive by. If you click run, it will start loading a virus onto your computer.


Only through the "hijacking" of the host cell DNA can the virus make protein.


A fake virus is something that looks like a virus, but is a "contained virus" in a way because the user of the "infected" computer can just shutdown their computer, and it will be all good again. A good way to make these fake viruses are via command prompt (batch files), and java scripts.


Two Types of Trojan HorseTrojan Horse in The IliadThe Trojan Horse is featured in Aeneid by the Latin writer Virgil. The Greek army, failing to take Troy, was almost at its breaking point. However, Odysseus devises a plan that includes this horse. The Greek army built a huge hollow wooden horse, filled it with a few dozen men, and left it at the Trojan gate. The Greeks then boarded their ships and traveled a short distance to hide their fleet. The horse was supposedly a gift to King Priam of troy from Agamemnon of Greece. The horse gets taken inside and during the night, the men jump out and open the Trojan gates for the whole of the Greek army to rush in and take the city. This is where the "Trojan" computer virus gets its name. Trojan Horse in ComputersA Trojan virus is a destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer. Trojan horses are broken down in classification based on how they breach systems and the damage they cause. A Trojan Horse Virus is a common yet difficult to remove computer threat. This is a type of virus that attempts to make the user think that it is a beneficial application. A Trojan Horse virus works by hiding within a set of seemingly useful software programs. Once executed or installed in the system, this type of virus will start infecting other files in the computer.A Trojan Horse Virus is also usually capable of stealing important information from the user's computer. It will then send this information to Internet servers designated by the developer of the virus. The developer will then be able to gain a level of control over the computer through this Trojan virus. While these things take place, the user will notice that the infected computer has become very slow or unexpected windows pop up without any activity from the user. Later on, this will result to a computer crash.It can spread in a number of ways. The most common means of infection is through email attachments. The developer of the virus usually uses various spamming techniques in order to distribute the virus to unsuspecting users. These emails contain attachments. Once the user opens the attachment, the Trojan Horse Virus immediately infects the system and performs the tasks mentioned above. Another method used by malware developers to spread their Trojan Horse viruses is via chat software such as Skype. Another method used by this virus in order to infect other machines is through sending copies of itself to the people in the address book of a user whose computer has already been infected by the virus.A Trojan Horse virus The best way to prevent a Trojan Horse Virus from entering and infecting your computer is to never open email attachments or files that have been sent by unknown senders. However, not all files we can receive are guaranteed to be virus-free. With this, a good way of protecting your PC against malicious programs such as this harmful application is to install and update an anti-virus program.The seven main types of Trojan horses are:Remote Access TrojansData Sending TrojansDestructive TrojansProxy TrojansFTP TrojansSecurity Software Disabling TrojansDenial-of-Service Attack (DoS) TrojansA Trojan horse, or Trojan, is a type of malware that masquerades as a legitimate file or helpful program possibly with the purpose of granting a hacker unauthorized access to a computer. Trojans do not attempt to inject themselves into other files like a computer virus. Trojan horses may steal information, or harm their host computer systems. Trojans may use drive-by downloads or install via online games or internet-driven applications in order to reach target computers. The term is derived from the Trojan Horse story in Greek mythology because Trojan horses employ a form of "social engineering," presenting themselves as harmless, useful gifts, in order to persuade victims to install them on their computers.A virus that disguises itself as a useful program to sneak into the victims computer.In Greek mythology, the Trojan horse was a devious plot used by the Greeks to gain access to the city of Troy. A large wooden horse was built and several dozen Greek warriors hid inside the horse. The Trojans thought the Greeks were signalling peace and the horse was a gift, so they brought the wooden horse inside the city gates. Late at night the Greek warriors snuck out of the horse, opened the gates and laid waste to the city of Troy. In modern useage, a Trojan horse is a false gift - something given to another person with the intent of hurting them.In computer useage, a Trojan horse is a type of virus that gains access to your computer by appearing innocent then wrecking havoc once it's in.answer 2A 'Trojan Horse' virus is a common and difficult to remove threat to a computer. It is a virus that attempts to make the user think that it is actually beneficial. It hides within a seemingly useful software program, but once executed or installed into your system it will start infecting other files in your computer. It is also usually capable of stealing important information from your computer and could even able to gain a level of control over your computer through this virus.


A virus huh? A Trojan perhaps? Well to be honest, must be what's in it. Apparently on my old computer, I got a virus too.Alex's computer doesnt seem to be laggy, but something must've gone wrong when he was make this server. So yeah..That's what I apparently think.


He had an idea to make the Trojan Horse.


No, the Trojan Horse was Odysseus's idea.


Many people make Java programs, but if you mean who invented the Java programming language it was James Gosling of Sun Microsystems.


The Roman poet Virgil wrote in his famous epic poem, The Aeneid about how the Greeks defeated the Trojans during the Trojan War. According to Virgil, the Greeks spent many months laying siege to the city of Troy, whose walls could not be toppled. One day, a Greek known as Odysseus devised a way to get into the city’s walls. The Greeks would make a large horse that could hold soldiers and leave it as an offering for the unsuspecting Trojans. The Trojans fell for the trick and the rest is history. Like the Trojan Horse of antiquity, Trojan viruses work in the same insidious way. They trick you into thinking that you have downloaded a harmless file, only to trick you into giving them access to your computer. When the time is right or when the author of the Trojan virus sends a signal, the virus activates and begins transmitting your confidential data to whoever is on the receiving end. Having a Trojan virus on your computer can leave you vulnerable to cyber crimes like identity theft and credit card theft, which is why Trojan virus removal is critical. However, actually removing a Trojan virus can be trickier than it seems.Most people are smart enough to have an antivirus program running on their computer. While these programs do a good job protecting your computer most of the time, new viruses are being written every day, which makes it difficult for antivirus manufacturers to keep up with the latest threats. It can take several weeks for these companies to find ways to combat the latest viruses. Even when they do, the fix is rarely simple. Occasionally, the antivirus program will remove the virus for you automatically, but most of the time, you’ll be sent to a webpage, owned by the antivirus maker that tells you how to remove the Trojan virus manually. If you’re not comfortable with working at the computer and following complex instructions, these instructions may be of little help to you. Even if you do manage to follow the instructions, there is still a chance that you may not have removed the virus completely.Instead of messing around with manual Trojan virus removal, consider formatting your hard drive. By formatting your hard drive, you will erase all the data on it, including the Trojan virus. While this may seem drastic, it is by far quicker and easier than spending hours trying to run virus scan after virus scan and attempting to manually remove the Trojan virus. Formatting and reinstalling your operating system can take less than an hour if you’ve done it before. Your computer may also come with a recovery DVD, which will make things even faster.Next time you have a Trojan virus that you want to remove, consider skipping the antivirus software all together and formatting your hard drive. You will save time and headaches by doing so and be up and running within an hour.


if your trying to open a java file make sure you have java


when you put it in a coffemaker, and put hot water w/ the java beans, you may make a java latte' .but make sure you have whipped cream to make the flavor balanced.


to make program java go to pangpong.com


I am not sure whether you actually need it, perhaps you do. The point is, if any Web site has Java applets - components programmed for Java - then the user must install Java to make it work. Java (and alternative technologies, such as Flash, or SilverLight) make it possible to make "richer" Web pages, i.e., Web pages with more options, and a better visual presentation.I am not sure whether you actually need it, perhaps you do. The point is, if any Web site has Java applets - components programmed for Java - then the user must install Java to make it work. Java (and alternative technologies, such as Flash, or SilverLight) make it possible to make "richer" Web pages, i.e., Web pages with more options, and a better visual presentation.I am not sure whether you actually need it, perhaps you do. The point is, if any Web site has Java applets - components programmed for Java - then the user must install Java to make it work. Java (and alternative technologies, such as Flash, or SilverLight) make it possible to make "richer" Web pages, i.e., Web pages with more options, and a better visual presentation.I am not sure whether you actually need it, perhaps you do. The point is, if any Web site has Java applets - components programmed for Java - then the user must install Java to make it work. Java (and alternative technologies, such as Flash, or SilverLight) make it possible to make "richer" Web pages, i.e., Web pages with more options, and a better visual presentation.


trojan woman and trojan man had sex to make rubber man



Copyright ยฉ 2020 Multiply Media, LLC. All Rights Reserved. The material on this site can not be reproduced, distributed, transmitted, cached or otherwise used, except with prior written permission of Multiply.