What kind of virus is Trojan?

Source: Internet
Author: User

The name of the Trojan Horse (Trojan) is derived from the Ancient Greek legends (Homer's epic Trojan Horse story, the Trojan Trojan horse is meant to Trojan, that is, the Trojan horse, that is, the story of the Trojan Horse). "Trojan" program is currently more popular virus files, unlike the general virus, it does not reproduce itself, and does not "deliberately" to infect other documents, it through its camouflage to attract users to download the implementation, to the application of Trojans to open the user's computer portal, so that the application can arbitrarily destroy, steal the documents of the People, Even remotely manipulating the computer of the person being planted.

Working principle

A complete Trojan program includes two parts: the server side (the Servers section) and the client (the controller portion). The computer that is implanted is the server, and the hacker is using the client to access the computer running the server. After running the server of the Trojan horse, it will produce a process with easy to confuse the user's name, secretly open the port, send the data to the designated place (such as the password of the network game, the password of the instant communication software and the user's password, etc.), the hacker can even use these open ports to

Trojans are not automatic, a Trojan is a program that contains or installs a malicious, it may seem useful or interesting to plan (or at least harmless) to a user who does not suspect, but is actually harmful when it is run. A Trojan horse does not run automatically, it is implied in a document of interest to some users, and is included with the user when downloading. When a user runs a document program, the Trojan Horse runs and the information or documents are corrupted and lost. Trojan Horse and back door is not the same, the backdoor refers to hidden in the program's secret function, is usually the program designer in order to be able to enter the system at random later set.

Trojan Horse has two kinds, universal and transitive, universal is controllable, and transitive is uncontrollable, carved dead operation.

Characteristics

Trojan horses have access to computers without the permission of computer users. The program has a very small amount of light, the runtime does not waste too much resources, so it is difficult to detect the use of anti-virus software, it is difficult to prevent the operation of its action, after running, immediately automatically log in the system boot zone, after each time the Windows load automatically run, or immediately automatically change the file name, or even invisible; or automatically replicate to another folder immediately, running actions that the user cannot run.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.