answersLogoWhite

0

Trojan horses are designed to allow a hacker to target a remote computer system. Once a Trojan horse has been installed on a target computer system, it is possible for a hacker to access it remotely and perform various operations and it may do so without any user intervention at the remote end.

User Avatar

Wiki User

12y ago

What else can I help you with?

Continue Learning about Computer Science

What does Trojan Agent 165984 do?

Not sure what it does . but if it was found to be a Trojan agent it would have the capabilities of a Trojan horse and could steal password etc. 1. Run Malwarebytes Anti-Malware 2. Run the anti spyware removal programs spybot 3 Run Superantispyware 4. Run a complete scan with free curing utility Dr.Web CureIt! Use Mozilla firefox or the Google chrome browsre for browsing unsafe websites


What different computer viruses are there. dart?

The main types of viruses are these 1. Virus 2. Worm 3. Trojan Horse 4. Spyware 5. Adware 6. Misleading Applications 7. Potentially Unwanted Application 8. Bloodhound Sniffer 9. Dialer 10.Tracking Cookie 11. Backdoor Trojan Any questions about any of these? Feel free to ask.


Where does 'PSW.Hermann agent' spyware found in Microsoft Internet Exlorer 6 found by TDS-3 anti-trojan scanner originate?

You need to run these 5 essential steps to remove all the spyware on your computer. 1. Run Deckard's System Scanner (DSS) 2. Run Malwarebytes Anti-Malware 3. Run the anti spyware removal programs spybot 4 Run Superantispyware 5. Run a complete scan with free curing utility Dr.Web CureIt! Install threat fire which will enhance your antivirus protection


How do you remove download Trojan found at C windows temp dwh2691.tmp if Norton says access denied?

1. Download and run firefox to protect your computer from future spyware attacks and pop ups which are coming in through internet explorer (Trojan downloaders, win32 ).Browser attacks aren't easy to spot because they piggyback on legitimate traffic that doesn't exhibit many obvious warning signs . 2. Run the vundo and combo fix 3. Run Malwarebytes Anti-Malware 4. Run the anti spyware remove programs spybot 5. Run a complete scan with free curing utility Dr.Web CureIt!


What are the different classifications of computer viruses?

žVirusA computer virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents and it behaves similary to a biological virus. There are hundereads and thousands of them in the world. žWormsIt is a similar program as a computer virus with the main ability to infect computers over the internet. Usually their main purpose is to attack certain web sites or to act as a Trojan horse. žSpywareSpyware programs are installed on your computer without your knowledge. Spyware can steal your personal information and increase your risk of identity theft. Spyware can track and record your online activity (surfing habits). Spyware is downloaded to your PC as you surf websites, download files and read emails. žAdwareIt is designed to display unwanted advertising on your computer and can really slow your PC down. žKey loggersSuch software can record every keystroke you make on your computer. Therefore it can steal your passwords and other personal data. žBrowser hijackersThis little tools will change your home page in Web browsers and search results. žTrojan horsesThey are also called Remote Access Trojans or RATs and allow an attacker to remotely control your computer. žMalwareThis is short for malicious software/threats and is typically used as a catch-all term to refer to any software designed to cause damage to a single computer, server or computer network, whether it's a virus, spyware, Trojan horse...