|
Answer» Trojan Horse
- A Trojan Horse program has the APPEARANCE of having a useful and desired FUNCTION.
- A Trojan Horse neither replicates nor copies itself, but causes damage or compromises the security of the computer.
- A Trojan Horse must be sent by someone or carried by ANOTHER program and may arrive in the form of a joke program or software of some sort.
- These are often used to capture your logins and passwords.
Example of Trojan Horses :
- Remote access TROJANS (RATs)
- Backdoor Trojans (backdoors)
- IRC Trojans (IRCbots)
- Keylogging Trojans
Trojan Horse Example of Trojan Horses :
|