16-11-2012, 06:00 PM
Trojan Horse programBack door and remote administration programs:
Trojan_Backdoors.ppt (Size: 339 KB / Downloads: 115)
Trojan Horse program
Name (Trojan horse) According to legend , the Greeks won the Trojan war by hiding in a huge, hollow wooden horse to sneak into the fortified city of Troy. It was built and filled with Greek warriors to get in troy city and open doors for all warriors out side troy city waiting to enter the city.
However there is another meaning of the term Trojan Horse in the field of computer architecture. Here it basically represents any piece of User Code which makes the Kernel Code access anything it would not have been able to access itself in the first place!. i.e make the OS do something it wasnt supposed to be doing.And such security loopholes are called Trojan Horses In the context of computer software, a Trojan horse is a program that contains or installs a malicious program (sometimes called the payload )
Types of Trojan horse (payloads)Trojan horse payloads are almost always designed to do various harmful things, but could be harmless. They are broken down in classification based on how they breach systems and the damage they cause. The seven main types of Trojan horse payloads are:1.Remote Access2. Email Sending3. Data Destructive4. FTP trojan (adding or copying data from the infected computer)5. denial-of-service attack (DoS)
How you can know if you are under Trojan horse attack?
For example, you download what appears to be a movie or music file, but when you click on it, you unleash a dangerous program that erases your disk, sends your credit card numbers and passwords to a stranger, or lets that stranger hack your computer to commit illegal Denial of service attacks . How do I get rid of Trojans?!?
1.Clean Re-installation:Back up your entire hard disk, format the disk, re-install the operating system and all your applications from original CDs.
2. Anti-Virus Software:anti-virus software is always going to be playing catch up with active virus on the system. Make sure your computer has an anti virus program on it and update it regularly. If you have an auto-update option included in your anti-virus program you should turn it on; that way if you forget to update your software you can still be protected from threats
3. Anti-Trojan Programs:These programs are the most effective against Trojan horse attacks, because they specialize in Trojans instead of general viruses.
4.. Avoid using peer to peer or P2P sharing networks like kazaa,Lime wire Ares, or Guntella because they are generally unprotected from viruses and Trojan Horse viruses spread through them especially easily. Some of these programs do offer some virus protection, but this is often not strong enough. If you insist on using P2P, it would be safe to not download files that claim to be "rare" songs, books, movies, pictures, etc.
Back door and remote administration programs:
On Windows computers, three tools commonly used by intruders to gain remote access to your computer are 1.BackOrifice:Back Orifice (often shortened to BO) is a controversial computer program designed for remote system administration. It enables a user to control a computer running the Microsoft Windows operating system from a remote location. The name is a pun on Microsoft BackOffice Server software.
Reverse Connection
new technology that came around about the same time that routers became popular. A few advantages of a reverse-connection:
1. No problems with routers blocking incoming data, because the connection is started outgoing for a server
2. Allows for mass-updating of servers by broadcasting commands, because many servers can easily connect to a single client.
The Difference Between a Virus and Trojan Horse
A computer virus attaches itself to a program or file so it can spread from one computer to another, leaving infections as it travels. Much like human viruses, computer viruses can range in severity: Some viruses cause only mildly annoying effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going. People continue the spread of a computer virus, mostly unknowingly, by sharing infecting files or sending e-mails with viruses as attachments in the e-mail.