Computer Viruses
Trojan War

What is a Trojan horse?

User Avatar
Wiki User
2017-08-31 01:01:05

"Two_Types_of_Trojan_Horse" id="Two_Types_of_Trojan_Horse">Two

Types of Trojan Horse

"Trojan_Horse_in_iThe_Iliad/i" id=

"Trojan_Horse_in_iThe_Iliad/i">Trojan Horse in The

Iliad

The Trojan Horse is featured in Aeneid by the Latin writer

Virgil. The Greek army, failing to take Troy, was almost at its

breaking point. However, Odysseus devises a plan that includes this

horse. The Greek army built a huge hollow wooden horse, filled it

with a few dozen men, and left it at the Trojan gate. The Greeks

then boarded their ships and traveled a short distance to hide

their fleet. The horse was supposedly a gift to King Priam of troy

from Agamemnon of Greece. The horse gets taken inside and during

the night, the men jump out and open the Trojan gates for the whole

of the Greek army to rush in and take the city. This is where the

"Trojan" computer virus gets its name.

"Trojan_Horse_in_Computers" id="Trojan_Horse_in_Computers">Trojan

Horse in Computers

A Trojan virus is a destructive program that masquerades as a

benign application. Unlike viruses, Trojan horses do not replicate

themselves but they can be just as destructive. One of the most

insidious types of Trojan horse is a program that claims to rid

your computer of viruses but instead introduces viruses onto your

computer. Trojan horses are broken down in classification based on

how they breach systems and the damage they cause.

A Trojan Horse Virus is a common yet difficult to remove

computer threat. This is a type of virus that attempts to make the

user think that it is a beneficial application. A Trojan Horse

virus works by hiding within a set of seemingly useful software

programs. Once executed or installed in the system, this type of

virus will start infecting other files in the computer.

A Trojan Horse Virus is also usually capable of stealing

important information from the user's computer. It will then send

this information to Internet servers designated by the developer of

the virus. The developer will then be able to gain a level of

control over the computer through this Trojan virus. While these

things take place, the user will notice that the infected computer

has become very slow or unexpected windows pop up without any

activity from the user. Later on, this will result to a computer

crash.

It can spread in a number of ways. The most common means of

infection is through email attachments. The developer of the virus

usually uses various spamming techniques in order to distribute the

virus to unsuspecting users. These emails contain attachments. Once

the user opens the attachment, the Trojan Horse Virus immediately

infects the system and performs the tasks mentioned above. Another

method used by malware developers to spread their Trojan Horse

viruses is via chat software such as Skype. Another method used by

this virus in order to infect other machines is through sending

copies of itself to the people in the address book of a user whose

computer has already been infected by the virus.

A Trojan Horse virus The best way to prevent a Trojan Horse

Virus from entering and infecting your computer is to never open

email attachments or files that have been sent by unknown senders.

However, not all files we can receive are guaranteed to be

virus-free. With this, a good way of protecting your PC against

malicious programs such as this harmful application is to install

and update an anti-virus program.

The seven main types of Trojan horses are:

  • Remote Access Trojans
  • Data Sending Trojans
  • Destructive Trojans
  • Proxy Trojans
  • FTP Trojans
  • Security Software Disabling Trojans
  • Denial-of-Service Attack (DoS) Trojans


A Trojan horse, or Trojan, is a type of malware that masquerades as

a legitimate file or helpful program possibly with the purpose of

granting a hacker unauthorized access to a computer. Trojans do not

attempt to inject themselves into other files like a computer

virus. Trojan horses may steal information, or harm their host

computer systems. Trojans may use drive-by downloads or install via

online games or internet-driven applications in order to reach

target computers. The term is derived from the Trojan Horse story

in Greek mythology because Trojan horses employ a form of "social

engineering," presenting themselves as harmless, useful gifts, in

order to persuade victims to install them on their computers.

A virus that disguises itself as a useful program to sneak into the

victims computer.

In Greek mythology, the Trojan horse was a devious plot used by the

Greeks to gain access to the city of Troy. A large wooden horse was

built and several dozen Greek warriors hid inside the horse. The

Trojans thought the Greeks were signalling peace and the horse was

a gift, so they brought the wooden horse inside the city gates.

Late at night the Greek warriors snuck out of the horse, opened the

gates and laid waste to the city of Troy.

In modern useage, a Trojan horse is a false gift - something

given to another person with the intent of hurting them.

In computer useage, a Trojan horse is a type of virus that gains

access to your computer by appearing innocent then wrecking havoc

once it's in.

answer 2A 'Trojan Horse' virus is a common and difficult to

remove threat to a computer. It is a virus that attempts to make

the user think that it is actually beneficial. It hides within a

seemingly useful software program, but once executed or installed

into your system it will start infecting other files in your

computer. It is also usually capable of stealing important

information from your computer and could even able to gain a level

of control over your computer through this virus.


Copyright © 2020 Multiply Media, LLC. All Rights Reserved. The material on this site can not be reproduced, distributed, transmitted, cached or otherwise used, except with prior written permission of Multiply.