Know More About Trojans and Backdoors
Submitted by Srikanth on Friday, 7 November 20087 Comments
A Trojan horse is an unauthorized program contained within a legitimate program. This unauthorized program performs functions unknown (and probably unwanted) by the user.
- It is a legitimate program that has been altered by the placement of unauthorized code within it; this code performs functions unknown (and probably unwanted) by the user.
- Any program that appears to perform a desirable and necessary function but that (because of unauthorized code within it that is unknown to the user) performs functions unknown (and definitely unwanted) by the user.
Working of Trojans

- Attacker gets access to the trojaned system as the system goes online
- By way of the access provided by the trojan attacker can stage attacks of different types.
Various Trojan Types
- Remote Access Trojans
- Password Sending Trojans
- Keyloggers
- Destructive
- Denial Of Service (DoS) Attack Trojans
- Proxy/Wingate Trojans
- FTP Trojans
- Software Detection Killers
Modes of Transmission
- Attachments
- Physical Access
- Browser And E-mail Software Bugs
- NetBIOS (File Sharing)
- Fake Programs
- Un-trusted Sites And Freeware Software
Backdoor Countermeasures
- Most commercial ant-virus products can automatically scan and detect backdoor programs before they can cause damage (Eg. before accessing a floppy, running exe or downloading mail)
- An inexpensive tool called Cleaner (http://www.moosoft.com/cleanet.html) can identify and eradicate 1000 types of backdoor programs and trojans.
- Educate your users not to install applications downloaded from the internet and e-mail attachments.
Popularity: 3% [?]
By using/following this site you agree to our Legal Disclaimer


Ya u told that what is trogen horse but please also tell how to make it
look, hm,
1. idk how to make it
2. how to set it on some page so I shock somebody
3. how to send it to some person … (by msn..if it can be sended lik dat )
..
4. THS SUX man..
I´m new in this area, I would annyone send me how to invad by ip, I alredy the Prorat, dark girl, and other but no ane of him work ever give a error when I try to enter his Ip never conect
thanks bro. you just RoCk!!
hw to do it man??
tell us completelee bro!!!
well bro thanks for sending this info and another thanks for not telling open some kids who are not link to computer science just want to get dark secrets hm hacking should remain open for guys who are attached to it not like other guys who just want to get piece of cake for nothing u rock!
am impressed the world has men with others @ heart as a young internet beginner & hacker i love this stuff …this site is richhhhh. pls it shall be recommended in facebook. sir i bow.
hence i want to grow & be skillfull. am a nigerian an undergraduate. a previlegde to be ur son(protege). [email protected] +2347064464016
Leave your response!
EMAIL SECURITY »
What to Do When Your Email Account is Hacked?
How to Recover Hacked Email Accounts?
It can be a real nightmare if someone hacks and takes control of your email account as it may contain confidential information like bank logins, credit card details and other sensitive data. …
HOW-TO GUIDES »
How to Trace Mobile Numbers
With the rapid growth of mobile phone usage in recent years, we have often observed that the mobile phone has become a part of many illegal and criminal activities. So in most cases, tracing the mobile number …
INTERNET SECURITY »
How Antivirus Software Works
Due to ever increasing threat from virus and other malicious programs, almost every computer today comes with a pre-installed antivirus software on it. In fact, an antivirus has become one of the most essential software package for every computer. Even though every one …
NETWORK HACKS »
How to Hack an Ethernet ADSL Router
Almost half of the Internet users across the globe use ADSL routers/modems to connect to the Internet however, most of them are unaware of the fact that it has a serious vulnerability which can easily be exploited even by a …
VIRUS CREATION »
How to Test the Working of your Antivirus – EICAR Test
Have you ever wondered how to test your Antivirus software to ensure it’s proper working? Well here is a quick and easy way to test your antivirus. The process is called EICAR test which will …
Categories
Blogroll
Recent Comments
Most Commented
Most Popular
Log In | Entries (RSS) | Comments (RSS) | Sitemap
© 2008-2011 GoHacking.Com. This content is copyrighted to Srikanth and may not be reproduced on other websites.