Trojan Horses

by : serdar5

A Trojan horse closely resembles a virus, but is actually in a category of its own.

The Trojan horse is often referred to as the most elementary form of malicious

code.A Trojan horse is used in the same manner as it was in Homer's Iliad; it is seecure program in which malicious code is contained inside of what appears to be harmless data or programming. It is most often disguised as something fun, such as a cool game.The malicious program is hidden, and when called to perform its functionality, can actually ruin your hard disk. One saving grace of a Trojan horse, if there is one, is that it does not propagate itself from one computer to another (selfreplication is a characteristic of the worm).

A common way for you to become the victim of a Trojan horse is for someone to send you an e-mail with an attachment that purports to do something useful.To the naked eye, it will most likely not appear that anything has happened when thea ttachment is launched.The reality is that the Trojan has now been installed (or initialized) on your system.What makes this type of attack scary is the possibility that it may be a remote control program. After you have launched this attachment,anyone who uses the Trojan horse as a remote server can now connect to your computer. Hackers have tools to determine what systems are running remote control Trojans, which can include communication over chat networks, e-mails, or Web pages, to alert the hacker that a new system has been infected and is available. After the specially designed port scanner on the hacker's end finds your system, all of your files are accessible to that hacker.Two common Trojan horse remote control programs are Back Orifice and NetBus, which was distributed through the whacka- mole game.