What is a trojan hourse?

  • Thread starter Thread starter Mark W
  • Start date Start date
Look it up on wikipedia, instead of trying to infect everyone elses computer - No one in their right mind is gonna click on that link
 
it is a virus

can be harmfull but mostly just shuts down you pc or slows it down

more info

Trojan horse payloads are almost always designed to cause harm, but can also be harmless. They are classified based on how they breach and damage systems. The six main types of Trojan horse payloads are:

Remote Accessing
Data Destruction
Downloader
Server Trojan(Proxy, FTP , IRC, Email, HTTP/HTTPS, etc.)
Security software disabler
Denial-of-service attack (DoS)
Some examples of damage are:

Erasing or overwriting data on a computer
Re-installing itself after being disabled
Encrypting files in a cryptoviral extortion attack
Corrupting files in a subtle way
Upload and download of files
Copying fake links, which lead to false websites, chats, or other account based websites, showing any local account name on the computer falsely engaging in untrue context
Falsifying records of downloading software, movies, or games from websites never visited by the victim.
Allowing remote access to the victim's computer. This is called a RAT (remote access trojan)
Spreading other malware, such as viruses (this type of trojan horse is called a 'dropper' or 'vector')
Setting up networks of zombie computers in order to launch DDoS attacks or send spam.
Spying on the user of a computer and covertly reporting data like browsing habits to other people (see the article on spyware)
Making screenshots
Logging keystrokes to steal information such as passwords and credit card numbers
Phishing for bank or other account details, which can be used for criminal activities
Installing a backdoor on a computer system
Opening and closing CD-ROM tray
Playing sounds, videos or displaying images
Calling using the modem to expensive numbers, thus causing massive phone bills
Harvesting e-mail addresses and using them for spam
Restarting the computer whenever the infected program is started
Deactivating or interfering with anti-virus and firewall programs
Deactivating or interfering with other competing forms of malware
Randomly shutting off the computer
Installing a virus
Slowing down your computer
Displaying pornographic sites
 
Back
Top