07-01-2014, 02:56 PM
TROJAN HORSE
TROJAN HORSE.pptx (Size: 119.5 KB / Downloads: 29)
Virus
small software programs designed to spread from one computer to another and to interfere with computer operation.
A virus might rapidly infect every file on individual compute.
It cannot spread itself
People continue the spread of a computer virus, mostly unknowingly, by sharing infecting files or sending e-mails with viruses as attachments.
Worm
similar to virus by its design
sub-class of a virus.
A program or algorithm that replicates itself over a computer network and usually performs malicious actions.
Unlike Virus, it has the capability to spread from computers to computers without any help from a person.
Trojan Horse
A Trojan horse is a destructive program that masquerades as a benign application.
Simply put, a Trojan horse is a malicious piece of software which requires users to invite it in, and is therefore disguised as something else.
Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.
Some of the harmful things for which Trojans are designed:
Erasing/Overwriting data on a computer.
Uploading and downloading files.
Allowing remote access to the victim's computer.
Logging keystrokes to steal information such as passwords and credit card numbers.
Phish for bank or other account details, which can be used for criminal activities.
Deactivate or interfere with anti-virus, firewall programs and other competing forms of malware
Generic PWS.ak
This Trojan also attempts to create an autorun.inf file on the root of any accessible disk volumes.
Registry key values have been added to the system to ensure that:
It registers itself with the compromised system and executes itself upon every boot.
It also creates service for the dropped file and set the start type as automatic.
It enables the Autorun.
It hides files from the user.
It steals online game accounts and passwords by monitoring the game process.