The Ultimate Guide to Choosing WordPress Pros and Cons
Impact of ict on society virus
1.
2.
3.
4. Types of Trojan horse payloads
Trojan horse payloads are almost always designed to do various harmful
things, but could be harmless. They are broken down in classification
based on how they breach systems and the damage they cause.
• The seven main types of Trojan horse payloads are:
1. Remote Access (designed to provied the attacker with complete
control of the victim‘s system)
2. Data Destructive Email Sending (designed to destroy and delete files)
3. Downloader (download manager for Microsoft Windows)
4. Proxy Trojan (disguising others as the infected computer)
5. FTP Trojan (adding or copying data from the infected computer)
6. Security software disabler (designed stop or kill security programs such
as antivirus program or firewall without the user knowing)
7. URL Trojan (directing the infected computer to only connect to the
internet via an expensive dial-up connection)