answersLogoWhite

0


Best Answer

A Trojan Horse program is designed to masquerade as a legit program in order to trick a user into downloading and running it. Most of the time, the Trojan Horse will provide the desired program, such as a game or music file, so as to avoid suspicion, but it runs malicious processes in the background. A Trojan Horse can do a number of things. Some come with a built-in keylogger so it can record keystrokes that allows a hacker to steal usernames and passwords. Others usually open a backdoor on the computer so it can download more malware off of the internet.

User Avatar

Wiki User

10y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

14y ago

This is a piece of software that is imported that looks innocuous but hides a malicious program within that can do damage to your system or mine and export personal details.

After the Wooden Horse of Troy,a gift that was taken into the gates of the city by the recipients not realising it was packed with soldiers who took the city from within.

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What does a Trojan horse attack?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

How are Trojan horses Greek?

the Trojan horse was a giant wooden hollow horse the Greeks used to hide soldiers in and to attack troy the Trojan symbol was a horse and they thought it was a gift


How does a Trojan horse virus attack a system?

they attack aquires when the document is open


Can Trojan horse virus attack the computer system without network?

It depends if the trojan horse was inside before networking was disabled.


Who or what helped the Greek fleet go to attack Troy in The Iliad?

the Trojan Horse


Was there a Trojan horse?

yes there was a Trojan Horse.


What type of malware substitutes itself for a legitimate program?

A Trojan Horse.


Which city was the Trojan Horse in?

The Trojan horse was pulled into Troy, hence 'Trojan'.


How many types of Trojan horse payloads are there?

The six main types of Trojan horse payloads are:Remote AccessData DestructionDown loaderServer Trojan(Proxy, FTP , IRC, Email, HTTP/HTTPS, etc.)Security software disablerDenial-of-service attack (DoS)


Which attack types are considered potentially destructive to data or hardware?

Choose two: Virus Trojan Horse


What are the types of Trojan horse virus?

There aren't types of Trojan Horse virus. A Trojan Horse is a type of virus.


What is the Trojan horse trick?

During the Trojan War, the Trojans "admitted defeat" and sent a "peace gift" of a beautiful, huge wooden horse to the Greeks' camp; but the Greeks didn't know that the horse was hollow and that the Trojans were hiding inside of it, ready to attack them.


What was the name of the horse that was used in the Trojan war?

The Trojan Horse