Trojan And Viruses Essay

2501 words - 11 pages

What is a trojan?A trojan horse could be either:a) Unauthorized instructions contained within a legitimate program. Theseinstrcutions perform functions unknown to (and probably unwanted by) the user.b) A legitimate program that has been altered by the placement of anauthorizedinstructions within it. These instructions perform functions unknown to (andprobably unwanted by) the user.c) Any program that appears to perform a desirable and necessary function butthat (because of unauthorized instructions within it) performs functionsunknown to (and probably unwanted by) the user.Under a restricted environment (a restricted Unix shell or a restrictedWindows computer), malicious trojans can't do ...view middle of the document...

During the rest of this text, we will explain about the most common types oftrojan horses.Remote Administration TrojansThese trojans are the most popular trojans now. Everyone wants to havethem trojan because they let you have access to your victim's harddrive, and also perform many functions on his computer (open and close hisCD-ROM drive, put message boxes on his computer etc'), which will scare offmost computer users and are also a hell lot of fun to run on your friends orenemies.Modern RAT'S (remote administration trojans) are verysimple to use. Theycome packaged with two files - the server file and the client file (if youdon't know which is which, look for a help file, a FAQ, a readme orinstructions on the trojan's homepage). Just fool someone into runnig theserver file and get his IP and you have FULLcontrol over his/her computer(some trojans are limited by their functions, but more functions also meanlarger server files. Some trojans are merely ment for the attacker to use themto upload another trojan to his target's computer and run it, hence they takevery little disk space). You can also bind trojans into other programswhich appear to be legitimate.RAT'S have the common remote access trojan functions like:keylogging(logging the target's keystrokes (keyboard functions) and sometimes eveninterfering with them, thus being able to use your keyboard to typeinstead of the target and say weird things in chatrooms or scare thehell out of people), upload and download function, make a screenshot of thetarget's monitor and so on.Some people use the trojans for malicious purposes. They either use them toirritate, scare or harm their enemies, scare the hell out of their friends orenemies and seem like a "super hacker" to them, getting information aboutpeople and spying on them or just get into people's computers and deletestuff. This is considered very lame.There are many programs out there that detects the most common trojans (suchas Nemesis at blacksun.box.sk, which also detects people trying to accessyour computer), but new trojans arereleased every day and it's pretty hard tokeep track of things.Trojans would usually want to automatically start whenever you boot-up yourcomputer. If you use Windows, you can get b00tm0n from blacksun.box.sk (note:at the time this tutrial was released, b00tm0n was not ready yet, but itshould be ready some time before year 2,000, so if you're reading this afterY2K, b00tm0n should probably be available at blacksun.box.sk). Under Unix, wesuggest getting some sort of an IDS (Intrusion Detection System) programs tomonitor your system.Most Windows trojans hidefrom the Alt+Ctrl+Del menu (we havn't seen any Unixprogram that had the ability to hide itself from the processes list yet, butyou can never know - one day someone might discover a way to do so. Hell,someone might have already did). This is bad because there are people who usethe task list to seewhich process are running. There are programs that willtell me you...

Find Another Essay On Trojan And Viruses

Computer Viruses Essay

533 words - 2 pages , and currently, thousands of known virus programs exist (Reed 85-102). Three types of viruses are a boot sector viruses, file virus, and Trojan horse virus. A boot sector virus infects the boot program used to start the system. When the infected boot program executes, the virus is loaded into the computer's memory. Once a virus is in memory, it can spread to any floppy disk inserted into the computer. A file virus inserts virus code into program

Dangers of the Internet Essay

998 words - 4 pages virus log up to date to be at risk of getting infected. Some ways viruses hide from detection is through the use of a Trojan horse. A Trojan horse is when a virus looks like a harmless file until the virus executes. This sometimes puts people off the trail of the virus in the begin but after someone fines the Trogon horse they can program the anti-virus software to look for the viral code and thus catch the virus before it has time to execute and

Topic: Web Security (Internet Banking)

1054 words - 4 pages click, a virus can enter you computer and spread itself among the documents on your computer. With worms, once they are into your computer they continuously reduplicate themselves until it fills up all the space in your CPU drive. The difference between viruses and worms is that viruses have its own host file to spread themselves among the documents, whereas worms stay put in documents. Finally, a Trojan Horse is a program that can be hidden in

Computer Viruses

1083 words - 5 pages message that was sent to your computer, and could automatically mail itself to people in your e-mail address book. Viruses have become so advanced that they may not even require a double –click. They can launch when you view an infected message. I would like to talk about two other threats to your computer. They are not viruses, but a “Trojan horse,” and a “worm” can be just as harmful. Unlike a virus, a Trojan horse or a worm can't spread on its own

Trojans,Worms, and Viruses: What Are They and What Can You Do to Stop Them

2339 words - 10 pages , or ruin data; erase the hard drive; steal money from online banking systems and online money transfer systems; download or upload private files; download more Trojans or viruses; see what the user is doing on the computer; and even control the PC for illegal reasons like buying banned drugs and stealing other people’s money. Trojans are never friendly and should be gotten rid of as soon as possible. The Trojans get their name from the Trojan horse

The Evolution of the Computer Virus

2030 words - 9 pages program was MS-DOS which itself was relatively new at that time. The same year, another application named “PC-Write” was developed which served as the first Trojan. During the development phase of viruses it was soon realized that infecting the files could increase the damages caused to the computer systems. Hence, 1987 saw the appearance of “Suriv02”, a virus infecting COM files and leading to development of other viruses, like "Viernes 13" and

Intro to Computer Forensics

880 words - 4 pages the computer memory and spreads through any floppy disk. The second type is the file virus which inserts virus code into program files that spreads into any program accesses the infected file. Another type is the Trojan virus.Some viruses would cause computer systems to freeze temporarily, followed by a sound or message. Other viruses have a logic bomb which is an activity that takes place when a certain action takes place in the computer. A

Network Security

1735 words - 7 pages user name and tries thousands of passwords to hack into the account. Reverse brute force is when the attacker has a password and will try many different usernames to gain access to the account. While brute force techniques are highly popular and often successful, they can take hours, weeks, or years to complete. There are also many different types of malicious software out there; some of the more common being viruses, worms and Trojan horses. A

Intro to computer virus

1571 words - 6 pages . Six months later the amount of macro viruses had risen by over 300%.At this stage it is estimated that 90% of all companies have at least one macro virus resident somewhere in their computer systems.Types of Viruses Under the main heading of viruses are three types of harmful computer programs, not all of which hide and replicate.The first of these is the Trojan Horse programs, the name of which comes from the Greek legend that told how Greek

Truth and Lies about the Computer Virus

1139 words - 5 pages will write a copy of itself to the last track of the diskette, and then alter the boot sector to point to this code. On high density 5.25 inch diskettes, the viral code will be located on Cylinder 79, Side 1, Sectors 8 and 9.'Junkie's description is that of a basic stealth/Trojan virus which have been in existance for 10 years. They also listed Anti-exe as one of the top ten viruses but did not acknowlege the fact that it has three aliases. It's

COMPUTER VIRUS

1066 words - 5 pages ) symptoms(Kanish, 1997). Qualitatively: Three types of viruses: (virus, worm , spyware and Trojan horse) what is the difference between a virus, worm , spyware and Trojan horse? . Virus: executive program (with type scr,.pif,.Bat,.Exe,.com) Works separately and aims to disrupt the computer system and ranging seriousness from his companions and dangerous than light, both malignant.( anonymous, 2013) Tunes by copying files from your infected files to

Similar Essays

Computer Viruses Essay

754 words - 4 pages viruses worldwide. Over 2000 new viruses are being discovered every month. There are three main types of viruses: Trojan Horses, Worms and Email Viruses. Trojan Horses- A Trojan named after the Greek army’s tactic of hiding their soldiers in a giant wooden horse that was sent as gift to the city of troy. This virus gets attached to some files in your computer and programs that you download from internet. As a result it starts destroying the file

Computer Viruses : Discussion About Virus

941 words - 4 pages changes, particularly in file size. Because many computer viruses alter system and data files – files that should not change in size – changes in file sizes often are a key indication of an infection.Other kind of electronic annoyances exist in addition to viruses, worms and Trojan horse applications actually are part of a broader category called malicious-logic programs•A worm, such as the CodeRed or Sircam worm, resides in active

Computer Viruses Essay

3440 words - 14 pages to find out the differences between a computer virus, a computer worm and a Trojan horse. The report will also include the common computer viruses, the different types of computer viruses, the reasons why computer viruses can be destructive and the different ways by which computer users can protect themselves against viruses, worms and Trojan horses.Computer VirusesA computer virus is a computer program that is hidden within another program that

Business Data Networks And Communications Impact Of Viruses On Networks

800 words - 3 pages ? Computer Virus - is a potentially damaging computer program that infects your computer. The Program alters the way your computer works without your knowledge or permission. Once the virus is in your computer, it can spread throughout and can damage your operating system.Types of VirusesTo name a few Trojan Horses, Worms, Boot sector viruses, Flash Crowds, Weeds, and Flying Dutchmen/Zombie viruses are threats to computers.What