Trojan Horse : A Lion in Sheepskin
Yesterday, I was browsing through the internet and I was trying to download an audio. Then I came across a website which had many download options throughout the page, I was very cautious of finding the actual download link and was trying not to click on any counterfeited link but somehow or the other I ended up downloading a virus on my computer. Thanks to the malware that my computer is safe. But, an idea crossed my mind that I must write a blog so as to help people who find this problem very exasperating and which leave their computer in a precarious state. I am specifically writing about Trojan Horse (One of the most detrimental virus).
When you will Google the word Trojan Horse you will find results stating about a wooden horse that the Greek soldiers used to enter Troy by hiding themselves in it. The term for the Trojan was also derived from the same incident and is also somewhat the same as far as the trick of concealing themselves is considered. Trojan Horses are a disguising form of virus (not exactly a virus) as they look harmless and safe to open but are one of the most malicious ones. Certainly, there is a sigh of relief that unlike viruses or worms Trojans can't replicate themselves but they surely are tricksters. All the advertisements and attachments on your mail that may seem useful or advantageous can contain a trojan. These trojans can be in the form of an update, anti-virus software, media files and download links.
What can Trojan Horse do once embedded in your system ? When Trojan Horses are introduced in a computer they conduct several malicious activities. I'm gonna discuss them in brief. What a Trojan Horse does, truly depends on the intentions of the attacker. Trojans can be used to totally destroy one's computer system. They can corrupt your hard disk, format your disk, introduce unwanted icons on your desktop etc. What the attackers gain personally is the confidential data of the user for example an individual's property details or secretly kept files. Most hazardous form is when the Trojans gain access to a person's credit card details because this can rob a person of his money. The Trojans are highly used by stalkers to keep a track of one's activities and also spy on a person.
There are many types of trojans:
Exploit: These trojans take advantage of the loopholes in the already existing softwares and start infecting them.
Backdoor: These trojans allow the malicious programmer to have a remote access of the desired computer or we can say a 'backdoor' to the other computer.
Rootkit: These trojans are amazingly helpful to the programmers in hiding the trojans and hence the user can't identify the existence of a trojan for a significantly long period of time.
Other types of trojans include Fake Anti-Virus, Banker, Denial of Services, Downloader etc. The names suggest that what is the basic intent of the type of virus.
Though protection against Trojans is almost impossible but the main concept lies within the fact that how much are you wary of downloading things from internet. An individual has to be damn cautious while opening any attachment as it must always be from a legitimate source else everybody knows the computer is at high risk of crashing. "Prevention is better than cure"… well this holds true in this case as cure is undoubtedly more costly as compared to prevention. Hence, you must always have a backup of everything important because there's always a fear of losing data in this very case.
I hope this blog was helpful in understanding the concept of Trojan Horse and how it can affect your daily work. I will again advise everyone to be braced and with this I would like conclude the topic.
for more info : cpd-india
Batches: Regular & Weekends for Working Profession
For FREE DEMO CLASS CALL – 011-65164822 / 91- 8860352748
CPD Technologies Block C 9/8, Sector -7, Rohini, Delhi-110085, India Landmark: Near Rohini East Metro Station, Opposite Metro Pillar No-397
Website :- www.cpd-india.com
Email :- support@cpd-india.com