Bd BUuZ ALL StArS HeRe
what is TROGEN virus Dj10
Register Here And Get Secret Tricks AND Software In Vip Arena
Bd BUuZ ALL StArS HeRe
what is TROGEN virus Dj10
Register Here And Get Secret Tricks AND Software In Vip Arena
Bd BUuZ ALL StArS HeRe
Would you like to react to this message? Create an account in a few clicks or log in to continue.

Bd BUuZ ALL StArS HeRe

1st international nimbuzz forum
 
HomeLatest imagesSearchRegisterLog in
Latest topics
» CREATE NIMBUZZ ID BY XML
what is TROGEN virus EmptySun Dec 01, 2013 10:07 am by €du

» how to use xml scripts
what is TROGEN virus EmptySun Dec 01, 2013 10:04 am by €du

» Tools Flood For Nimbuzz
what is TROGEN virus EmptyFri Mar 22, 2013 4:42 am by jersky0622

» Bot 20 Autouu Message_v2.0
what is TROGEN virus EmptySat Feb 09, 2013 10:49 am by pasam--1

» add-flood2013
what is TROGEN virus EmptySun Feb 03, 2013 11:50 am by pasam--1

» vanhelsing multi nimbuzz tools v2.0
what is TROGEN virus EmptyWed Dec 26, 2012 3:31 am by ---snyper---

» Daily free flood ids www.abeoye.malware-site.www
what is TROGEN virus EmptySat Dec 08, 2012 10:28 pm by abe.oye

» plz upload new the link is dead
what is TROGEN virus EmptyWed Dec 05, 2012 11:05 am by somic2008

»  SEO MegaPack 2012
what is TROGEN virus EmptyMon Dec 03, 2012 9:45 am by game

Top posters
maxr0ckers
what is TROGEN virus I_vote_lcapwhat is TROGEN virus I_voting_barwhat is TROGEN virus I_vote_rcap 
power
what is TROGEN virus I_vote_lcapwhat is TROGEN virus I_voting_barwhat is TROGEN virus I_vote_rcap 
game
what is TROGEN virus I_vote_lcapwhat is TROGEN virus I_voting_barwhat is TROGEN virus I_vote_rcap 
_rider_08
what is TROGEN virus I_vote_lcapwhat is TROGEN virus I_voting_barwhat is TROGEN virus I_vote_rcap 
-=.diablo.=-
what is TROGEN virus I_vote_lcapwhat is TROGEN virus I_voting_barwhat is TROGEN virus I_vote_rcap 
vabs_maurya
what is TROGEN virus I_vote_lcapwhat is TROGEN virus I_voting_barwhat is TROGEN virus I_vote_rcap 
baurza
what is TROGEN virus I_vote_lcapwhat is TROGEN virus I_voting_barwhat is TROGEN virus I_vote_rcap 
()~n!nja~()
what is TROGEN virus I_vote_lcapwhat is TROGEN virus I_voting_barwhat is TROGEN virus I_vote_rcap 
tw!l!ghts
what is TROGEN virus I_vote_lcapwhat is TROGEN virus I_voting_barwhat is TROGEN virus I_vote_rcap 
bratm.j
what is TROGEN virus I_vote_lcapwhat is TROGEN virus I_voting_barwhat is TROGEN virus I_vote_rcap 
ADVERTISEMENT
hostcrz.com

 

 what is TROGEN virus

Go down 
2 posters
AuthorMessage
power
Diamond Member
Diamond Member
power


Posts : 162
BDbuzZ Points : 5279
Join date : 2011-04-07
Age : 36
Location : access denied

what is TROGEN virus Empty
PostSubject: what is TROGEN virus   what is TROGEN virus EmptySat Apr 09, 2011 5:58 am

The most important difference between a trojan virus/trojan horse and a virus is that trojans don’t spread themselves. Trojan horses disguise themselves as valuable and useful software available for download on the internet. Most people are fooled by this ploy and end up dowloading the virus disguised as some other application. The name comes from the mythical “Trojan Horse” that the Ancient Greeks set upon the city of Troy.

A trojan horse is typically separated into two parts – a server and a client. It’s the client that is cleverly disguised as significant software and positioned in peer-to-peer file sharing networks, or unauthorized download websites. Once the client Trojan executes on your computer, the attacker, i.e. the person running the server, has a high level of control over your computer, which can lead to destructive effects depending on the attacker’s purpose.

Trojan Virus Trojan Virus

A trojan horse virus can spread in a number of ways. The most common means of infection is through email attachments. The developer of the virus usually uses various spamming techniques in order to distribute the virus to unsuspecting users. Another method used by malware developers to spread their trojan horse viruses is via chat software such as Yahoo Messenger and Skype. Another method used by this virus in order to infect other machines is through sending copies of itself to the people in the address book of a user whose computer has already been infected by the virus.
Types of Trojan Horse Viruses

Trojan Horses have developed to a remarkable level of cleverness, which makes each one radically different from each other. For an inclusive understanding, we have classified them into the following:

Remote Access Trojans

Remote Access Trojans are the most frequently available trojans. These give an attacker absolute control over the victim’s computers. The attacker can go through the files and access any personal information about the user that may be stored in the files, such as credit card numbers, passwords, and vital financial documents.

Password Sending Trojans

The intention of a Password Sending Trojan is to copy all the cached passwords and look for other passwords as you key them into your computer, and send them to particular email addresses. These actions are performed without the awareness of the users. Passwords for restricted websites, messaging services, FTP services and email services come under direct threat with this kind of trojan.

Key Loggers

Key Loggers type of Trojans logs victims’ keystrokes and then send the log files to the attacker. It then searches for passwords or other sensitive data in the log files. Most of the Key Loggers come with two functions, such as online and offline recording. Of course, they can be configured to send the log file to a specific email address on a daily basis.

Destructive Trojans

The only purpose of Destructive Trojans is to destroy and delete files from the victims’ computers. They can automatically delete all the core system files of the computer. The destructive trojan could be controlled by the attacker or could be programmed to strike like a logic bomb, starting on a particular day or at specific time.

Denial of Service (DoS) Attack Trojans

The core design intention behind Denial of Service (DoS) Attack Trojan is to produce a lot of internet traffic on the victim’s computer or server, to the point that the Internet connection becomes too congested to let anyone visit a website or download something. An additional variation of DoS Trojan is the Mail-Bomb Trojan, whose key plan is to infect as many computers as possible, concurrently attacking numerous email addresses with haphazard subjects and contents that cannot be filtered.

Proxy/Wingate Trojans

Proxy/Wingate Trojans convert the victim’s computer into a Proxy/Wingate server. That way, the infected computer is accessible to the entire globe to be used for anonymous access to a variety of unsafe Internet services. The attacker can register domains or access pornographic websites with stolen credit cards or do related illegal activities without being traced.

FTP Trojans

FTP Trojans are possibly the most simple, and are outdated. The only action they perform is, open a port numbered 21 – the port for FTP transfers – and let anyone connect to your computer via FTP protocol. Advance versions are password-protected, so only the attacker can connect to your computer.

Software Detection Killers

Software Detection Killers kill popular antivirus/firewall programs that guard your computer to give the attacker access to the victim’s machine.

FTP Trojans

Note: A Trojan could have any one or a combination of the above mentioned functionalities. Some might also come on USB drives, usually as “Autorun.inf” viruses.

The best way to prevent a Trojan Horse Virus from entering and infecting your computer is to never open email attachments or files that have been sent by unknown senders. However, not all files we can receive are guaranteed to be virus-free. With this, a good way of protecting your PC against malicious programs such as this harmful application is to install and update an antivirus program.[
Back to top Go down
maxr0ckers
Diamond Member
Diamond Member
maxr0ckers


Posts : 273
BDbuzZ Points : 5072
Join date : 2011-04-06
Age : 38
Location : jeddah

what is TROGEN virus Empty
PostSubject: Re: what is TROGEN virus   what is TROGEN virus EmptySat Apr 09, 2011 7:27 pm

nice share
Back to top Go down
 
what is TROGEN virus
Back to top 
Page 1 of 1
 Similar topics
-
» Caught A Virus?

Permissions in this forum:You cannot reply to topics in this forum
Bd BUuZ ALL StArS HeRe :: Nimbuzz Zone :: Nimbuzz Member Arena-
Jump to: