Beruflich Dokumente
Kultur Dokumente
Upload a Document
Search Documents
Explore
Aryan Sahu
Welcome to Scribd - Where the world comes to read, discover, and share...
Ravi Sahoo
Orange Aier
Pallabi Joshi
Alok Dash
Rasmita Parida
Om Kumar
Tumbanath Dash
Sibabrata Mantri
Bibhuprasad Samal
Nirmalya Mohapatra
/ 5
Download this Document for Free
Trojan horses are broken down in classification based on how they breach
systemsand the damage they cause. The seven main types of Trojan horses
are:
ATA SEN
DI
NG TROJANS
ESTRUCT
IV
E TROJANS
A type of Trojan horses designed to destroy and delete files, and is morelike a
virus than any other Trojan. It can often go undetected by AntivirusSoftware.
P
ROXY TROJANS
TROJANS
A type of Trojan horse designed to open port 21 (the port for FTP transfer)and
lets the attacker connect to your computer using File Transfer Protocol(FTP).
SECUR
TY SO
TWARE
A type of Trojan horse designed stop or kill security programs such asan
antivirus program or firewall without the user knowing. This Trojan typeis
normally combined with another type of Trojan as a payload.
Short for
enial-
o
f-
ervice attack,
ing of Death
and
Teardrop
attacks, exploit limitations in the TCP/IP protocols. Forall known DoS attacks,
there are software fixes that system administratorscan install to limit the
damage caused by the attacks. But, like viruses, newDoS attacks are
constantly being dreamed up by hackers.
If you receive e-mail from someone that you do not know or you receive
anunknown attachment, never open it right away. As an e-mail user,
youshould confirm the source. Some hackers have the ability to steal
addressbooks, so if you see e-mail from someone you know, it is not
necessarilysafe.2.
When setting up your e-mail client, make sure that you have the settings
sothat attachments do not open automatically. Some e-mail clients come
readywith an anti-virus program that scans any attachments before they
areopened. If your client does not come with this, it would be best to
purchaseone or download one for free.3.
If you are using a commercial operating system, make sure your computer
has an anti-virus program on it and update it regularly. If you have an auto-
update option included in your anti-virus program you should turn it on; that
way if you forget to update your software you can still be protected
fromthreats. In case of having a UNIX-based OS, the risks are greatly
reduced.4.
. Even if you trust the source, the file may be infected withouttheir
knowlegde. Most anti-virus software will auto-scan downloads, if youhave the
option enabled. If not, then the onus is upon you to perform thescan. As you
would scan any email attachment you receive, so should youscan any file you
download from someone else (and in rare cases, fromtrusted sites).Besides
these sensible precautions, one can also install anti-trojan software, someof
which is offered free.
Methods of
nfection
The majority of trojan horse infections occur because the user was tricked
intorunning an infected program. This is why it is advised to not open
unexpectedattachments on emails -- the program is often a cute animation or
a sexy picture,but behind the scenes it infects the computer with a trojan or
worm. The infectedprogram doesn't have to arrive via email, though; it can
be sent to you in an InstantMessage, downloaded from a Web site or by FTP,
or even delivered on a CD or floppy disk. (Physical delivery is uncommon, but
if you were the specifi c target of an attack, it would be a fairly reliable way to
infect your computer.) Furthermore,an infected program could come from
someone who sits down at your computer and loads it manually. The chances
of receiving the virus through an instantmessage are very low. It is usually
received through a download.
Open ports:
y
Svchost32.exe
Svhost.exe
back.exe
Road apple
Methods of
eletion
Since trojan horses take a variety of forms, there isn't a single method for
deletingthem. The simplest responses involve clearing the temporary internet
files on acomputer, or finding the file and deleting it manually. In some cases,
registryediting or other treatments are needed.
Downloader EV
Pest trap
y
Netbus
Flooder
Trojan-Horse-Doc
rajeshkutiwari
Related Documents
PreviousNext
p.
p.
p.
p.
p.
p.
p.
p.
p.
p.
p.
p.
p.
p.
p.
p.
p.
PreviousNext
5 p.
78 p.
485 p.
Add a Comment
Upload a Document
Search Documents
Follow Us!
scribd.com/scribd
twitter.com/scribd
facebook.com/scribd
About
Press
Blog
Partners
Scribd 101
Web Stuff
Scribd Store
Support
FAQ
Developers / API
Jobs
Terms
Copyright
Privacy
Language:
English