SlideShare una empresa de Scribd logo
1 de 11
VIRUS
 TROJAN HOURSE
 PURPOSE AND USAGE
 CURRENT USAGE
 COMMON TROJANS HORSE
 RECENT INNOVATION IN TROJAN
 SECURITY FROM
 TROJAN PROJECT INFORMATION



A computer virus is a computer program that replicate
itself and spread from one computer to another.



The term "virus" is also erroneously, used to refer types
of malware, including adware and spyware programs
that don’t replicate .



Malware (malicious software) are used disrupt
computer operation, gather sensitive information, or
gain access to pc’s systems.



Many active malware threats are trojans or worms than
viruses. Trojan horses and worms are confused with
viruses.








The term is derived from Greek mythology .
Trojans are non-self-replicating type of
malware which appears to perform a desirable
function.
Instead it facilitates unauthorized access to the
user's computer system.
Do not attempt to inject themselves into other
files like computer virus.
Trojans may use drive-by downloads or install
via online games ,internet-driven applications
In order to reach target computers.














Trojan can hacker remote access to targeted computer
system.
Operations that could be performed by a hacker on a
targeted computer system may include:
Use of the machine as part of a botnet.
Crashing the computer
Blue screen of death
Electronic money theft
Data theft (e.g. retrieving passwords or credit card
information)
Installation of software, including third-party malware and
ransomware
Downloading or uploading of files on the user's computer
Modification or deletion of files
Keystroke logging
Watching the user's screen








Botnets popularity and availability of advertising
services permit authors to violate their users' privacy.
Trojan horses are becoming more common.
survey conducted by BitDefender (2009) "Trojan-type
malware are 83-percent of the global.
spreads with help of worms and travel across the
internet with them.
main purpose to make host system open to access
through the internet.
BitDefender states approximately 15% of computers
are members of a botnet (Trojan infection)
Netbus (by Carl-Fredrik Neikter)
Subseven or Sub7(by Mobman)
Back Orifice (Sir Dystic)
Beast
Zeus
The Blackhole exploit kit[11]
Flashback Trojan (Trojan
BackDoor.Flashback)
 ProRat
 ZeroAccess














its code takes advantage of a security flaw of
Internet Explorer and Google Chrome .
use host computer as an anonymizer proxy to
hide internet usage.
hacker can view internet sites tracking
cookies, internet history, any IP logging.
host's computer may show the internet history
using effected computer as proxy.
Newer generations of Trojans tend to "cover"
olders tracks leaving tracks on viewed page.
the most widely distributed eg such type of
Trojan horse are SUB7.
Use good antivirus
 Always scan files emails before opening
to your system
 Trojans can be far more harmful than
viruses,
 Use trojans controllers.
 Never open scam emails.
 Delete .exe files not from authorized sites.

Our project describes working of a
simple trojan.
 This trojan crupts window os .
 It places junk file in c drive to fill hardisk
space
 Its undetected by antivirus
 Damage can be restore by deleting .dll
file from c drive.

Torjan horse virus

Más contenido relacionado

La actualidad más candente

Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its typesJatin Kumar
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information SecurityGareth Davies
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoorsShrey Vyas
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing ThreatNick Miller
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From MalwareINFONAUTICS GmbH
 
Web application attacks
Web application attacksWeb application attacks
Web application attackshruth
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malwareamiable_indian
 
Ransomware attack
Ransomware attackRansomware attack
Ransomware attackAmna
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?Faith Zeller
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering OWASP Foundation
 

La actualidad más candente (20)

Malware
MalwareMalware
Malware
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
Ransomware
RansomwareRansomware
Ransomware
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Adware
AdwareAdware
Adware
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
What is malware
What is malwareWhat is malware
What is malware
 
Malware
MalwareMalware
Malware
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Computer virus
Computer virusComputer virus
Computer virus
 
Malware
MalwareMalware
Malware
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing Threat
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
Types of malware
Types of malwareTypes of malware
Types of malware
 
Web application attacks
Web application attacksWeb application attacks
Web application attacks
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
Computer virus
Computer virusComputer virus
Computer virus
 
Ransomware attack
Ransomware attackRansomware attack
Ransomware attack
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering
 

Destacado

Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan100701982
 
How a Credit Union Can Stay Off the CFPB's Radar
How a Credit Union Can Stay Off the CFPB's RadarHow a Credit Union Can Stay Off the CFPB's Radar
How a Credit Union Can Stay Off the CFPB's RadarSilver cloud
 
AMA SUNDAY NIGHT AUCTION 12/29/2013 JEWELRY MAKING SUPPLIES
AMA SUNDAY NIGHT AUCTION 12/29/2013 JEWELRY MAKING SUPPLIESAMA SUNDAY NIGHT AUCTION 12/29/2013 JEWELRY MAKING SUPPLIES
AMA SUNDAY NIGHT AUCTION 12/29/2013 JEWELRY MAKING SUPPLIESmrsbubba33
 
GelecekHane - Endüstri 2.0 Konferansı: Halil Aksu - Kapanış Sunumu
GelecekHane - Endüstri 2.0 Konferansı: Halil Aksu - Kapanış SunumuGelecekHane - Endüstri 2.0 Konferansı: Halil Aksu - Kapanış Sunumu
GelecekHane - Endüstri 2.0 Konferansı: Halil Aksu - Kapanış SunumuGelecek Hane
 
Top10 Trends 2015 - GelecekHane
Top10 Trends 2015 - GelecekHaneTop10 Trends 2015 - GelecekHane
Top10 Trends 2015 - GelecekHaneGelecek Hane
 
Economic Industries!
Economic Industries!Economic Industries!
Economic Industries!Sanjam Kanwar
 
GelecekHane Ticaret 2.0 -Akan Abdula - Davranış Enstitüsü
GelecekHane Ticaret 2.0 -Akan Abdula - Davranış EnstitüsüGelecekHane Ticaret 2.0 -Akan Abdula - Davranış Enstitüsü
GelecekHane Ticaret 2.0 -Akan Abdula - Davranış EnstitüsüGelecek Hane
 
Proyecto de investigación: Amazing animals and_plants
Proyecto de investigación: Amazing animals and_plantsProyecto de investigación: Amazing animals and_plants
Proyecto de investigación: Amazing animals and_plantsmjuanalcaide
 
ITFT - Famous wild life sancturies
ITFT - Famous wild life sancturiesITFT - Famous wild life sancturies
ITFT - Famous wild life sancturiesAnuj Tomar
 
Ailing planet; the green movements role
Ailing planet; the green movements roleAiling planet; the green movements role
Ailing planet; the green movements roleMohammed Suhail
 
khidmat masyarakat dan penjelajahan lasak PRIME
khidmat masyarakat dan penjelajahan lasak PRIMEkhidmat masyarakat dan penjelajahan lasak PRIME
khidmat masyarakat dan penjelajahan lasak PRIMEKamil Mieyl
 
November 2013 Corporate Presentation
November 2013 Corporate PresentationNovember 2013 Corporate Presentation
November 2013 Corporate Presentationoncolyticsinc
 
Go green curb global warming
Go green curb global warmingGo green curb global warming
Go green curb global warmingMohammed Suhail
 
May 2016 Corporate Presentation
May 2016 Corporate PresentationMay 2016 Corporate Presentation
May 2016 Corporate Presentationoncolyticsinc
 
Gelecek hane perspektif-raporu-subat-2015
Gelecek hane perspektif-raporu-subat-2015Gelecek hane perspektif-raporu-subat-2015
Gelecek hane perspektif-raporu-subat-2015Gelecek Hane
 
Cantabrian mountains
Cantabrian mountains Cantabrian mountains
Cantabrian mountains mjuanalcaide
 
Teorias de la personalidad
Teorias de la personalidadTeorias de la personalidad
Teorias de la personalidadJenny Rojas
 

Destacado (20)

Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
How a Credit Union Can Stay Off the CFPB's Radar
How a Credit Union Can Stay Off the CFPB's RadarHow a Credit Union Can Stay Off the CFPB's Radar
How a Credit Union Can Stay Off the CFPB's Radar
 
AMA SUNDAY NIGHT AUCTION 12/29/2013 JEWELRY MAKING SUPPLIES
AMA SUNDAY NIGHT AUCTION 12/29/2013 JEWELRY MAKING SUPPLIESAMA SUNDAY NIGHT AUCTION 12/29/2013 JEWELRY MAKING SUPPLIES
AMA SUNDAY NIGHT AUCTION 12/29/2013 JEWELRY MAKING SUPPLIES
 
GelecekHane - Endüstri 2.0 Konferansı: Halil Aksu - Kapanış Sunumu
GelecekHane - Endüstri 2.0 Konferansı: Halil Aksu - Kapanış SunumuGelecekHane - Endüstri 2.0 Konferansı: Halil Aksu - Kapanış Sunumu
GelecekHane - Endüstri 2.0 Konferansı: Halil Aksu - Kapanış Sunumu
 
Top10 Trends 2015 - GelecekHane
Top10 Trends 2015 - GelecekHaneTop10 Trends 2015 - GelecekHane
Top10 Trends 2015 - GelecekHane
 
Economic Industries!
Economic Industries!Economic Industries!
Economic Industries!
 
MapReduce and Hadoop
MapReduce and HadoopMapReduce and Hadoop
MapReduce and Hadoop
 
Par2012
Par2012Par2012
Par2012
 
GelecekHane Ticaret 2.0 -Akan Abdula - Davranış Enstitüsü
GelecekHane Ticaret 2.0 -Akan Abdula - Davranış EnstitüsüGelecekHane Ticaret 2.0 -Akan Abdula - Davranış Enstitüsü
GelecekHane Ticaret 2.0 -Akan Abdula - Davranış Enstitüsü
 
Proyecto de investigación: Amazing animals and_plants
Proyecto de investigación: Amazing animals and_plantsProyecto de investigación: Amazing animals and_plants
Proyecto de investigación: Amazing animals and_plants
 
ITFT - Famous wild life sancturies
ITFT - Famous wild life sancturiesITFT - Famous wild life sancturies
ITFT - Famous wild life sancturies
 
Ailing planet; the green movements role
Ailing planet; the green movements roleAiling planet; the green movements role
Ailing planet; the green movements role
 
khidmat masyarakat dan penjelajahan lasak PRIME
khidmat masyarakat dan penjelajahan lasak PRIMEkhidmat masyarakat dan penjelajahan lasak PRIME
khidmat masyarakat dan penjelajahan lasak PRIME
 
November 2013 Corporate Presentation
November 2013 Corporate PresentationNovember 2013 Corporate Presentation
November 2013 Corporate Presentation
 
Go green curb global warming
Go green curb global warmingGo green curb global warming
Go green curb global warming
 
May 2016 Corporate Presentation
May 2016 Corporate PresentationMay 2016 Corporate Presentation
May 2016 Corporate Presentation
 
Gelecek hane perspektif-raporu-subat-2015
Gelecek hane perspektif-raporu-subat-2015Gelecek hane perspektif-raporu-subat-2015
Gelecek hane perspektif-raporu-subat-2015
 
Nike
Nike Nike
Nike
 
Cantabrian mountains
Cantabrian mountains Cantabrian mountains
Cantabrian mountains
 
Teorias de la personalidad
Teorias de la personalidadTeorias de la personalidad
Teorias de la personalidad
 

Similar a Torjan horse virus

Internet Security
Internet SecurityInternet Security
Internet SecurityManoj Sahu
 
Ids 007 trojan horse
Ids 007 trojan horseIds 007 trojan horse
Ids 007 trojan horsejyoti_lakhani
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan BackdoorsJauwadSyed
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spywaremissstevenson01
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoorsseth edmond
 
Network security .pptx
Network security .pptxNetwork security .pptx
Network security .pptxAvinash627658
 
What is Malware (Antivirus)
What is Malware (Antivirus)What is Malware (Antivirus)
What is Malware (Antivirus)Paras Intotech
 
Presentation24190
Presentation24190Presentation24190
Presentation24190KRT395
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptxAbiniyavk
 
The trojan horse virus
The trojan horse virusThe trojan horse virus
The trojan horse virusHTS Hosting
 
Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilitiesricharddxd
 
Ahmad Pussycat Dolls
Ahmad Pussycat DollsAhmad Pussycat Dolls
Ahmad Pussycat Dollsmastermind07
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES Sagilasagi1
 

Similar a Torjan horse virus (20)

Internet Security
Internet SecurityInternet Security
Internet Security
 
Ids 007 trojan horse
Ids 007 trojan horseIds 007 trojan horse
Ids 007 trojan horse
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan Backdoors
 
Information security
Information securityInformation security
Information security
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spyware
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoors
 
Trojan Virus.pptx
Trojan Virus.pptxTrojan Virus.pptx
Trojan Virus.pptx
 
Network security .pptx
Network security .pptxNetwork security .pptx
Network security .pptx
 
What is Malware (Antivirus)
What is Malware (Antivirus)What is Malware (Antivirus)
What is Malware (Antivirus)
 
Presentation24190
Presentation24190Presentation24190
Presentation24190
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
The trojan horse virus
The trojan horse virusThe trojan horse virus
The trojan horse virus
 
Presentation2
Presentation2Presentation2
Presentation2
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilities
 
Dickmaster
DickmasterDickmaster
Dickmaster
 
Ahmad Pussycat Dolls
Ahmad Pussycat DollsAhmad Pussycat Dolls
Ahmad Pussycat Dolls
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
MALWARE
MALWAREMALWARE
MALWARE
 
virus
  virus  virus
virus
 

Último

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 

Último (20)

INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 

Torjan horse virus

  • 1.
  • 2. VIRUS  TROJAN HOURSE  PURPOSE AND USAGE  CURRENT USAGE  COMMON TROJANS HORSE  RECENT INNOVATION IN TROJAN  SECURITY FROM  TROJAN PROJECT INFORMATION 
  • 3.  A computer virus is a computer program that replicate itself and spread from one computer to another.  The term "virus" is also erroneously, used to refer types of malware, including adware and spyware programs that don’t replicate .  Malware (malicious software) are used disrupt computer operation, gather sensitive information, or gain access to pc’s systems.  Many active malware threats are trojans or worms than viruses. Trojan horses and worms are confused with viruses.
  • 4.       The term is derived from Greek mythology . Trojans are non-self-replicating type of malware which appears to perform a desirable function. Instead it facilitates unauthorized access to the user's computer system. Do not attempt to inject themselves into other files like computer virus. Trojans may use drive-by downloads or install via online games ,internet-driven applications In order to reach target computers.
  • 5.             Trojan can hacker remote access to targeted computer system. Operations that could be performed by a hacker on a targeted computer system may include: Use of the machine as part of a botnet. Crashing the computer Blue screen of death Electronic money theft Data theft (e.g. retrieving passwords or credit card information) Installation of software, including third-party malware and ransomware Downloading or uploading of files on the user's computer Modification or deletion of files Keystroke logging Watching the user's screen
  • 6.       Botnets popularity and availability of advertising services permit authors to violate their users' privacy. Trojan horses are becoming more common. survey conducted by BitDefender (2009) "Trojan-type malware are 83-percent of the global. spreads with help of worms and travel across the internet with them. main purpose to make host system open to access through the internet. BitDefender states approximately 15% of computers are members of a botnet (Trojan infection)
  • 7. Netbus (by Carl-Fredrik Neikter) Subseven or Sub7(by Mobman) Back Orifice (Sir Dystic) Beast Zeus The Blackhole exploit kit[11] Flashback Trojan (Trojan BackDoor.Flashback)  ProRat  ZeroAccess       
  • 8.       its code takes advantage of a security flaw of Internet Explorer and Google Chrome . use host computer as an anonymizer proxy to hide internet usage. hacker can view internet sites tracking cookies, internet history, any IP logging. host's computer may show the internet history using effected computer as proxy. Newer generations of Trojans tend to "cover" olders tracks leaving tracks on viewed page. the most widely distributed eg such type of Trojan horse are SUB7.
  • 9. Use good antivirus  Always scan files emails before opening to your system  Trojans can be far more harmful than viruses,  Use trojans controllers.  Never open scam emails.  Delete .exe files not from authorized sites. 
  • 10. Our project describes working of a simple trojan.  This trojan crupts window os .  It places junk file in c drive to fill hardisk space  Its undetected by antivirus  Damage can be restore by deleting .dll file from c drive. 