Download presentation
Presentation is loading. Please wait.
Published byHelena Booker Modified over 8 years ago
1
Trojan Horse Viruses By: Amanda Mohammed Nov. 22, 2012
2
History Lesson Victory Gift!!
3
History Lesson At nightfall the Greek army snuck out
4
History Lesson Destroyed City of Troy
5
So What? Trojan Horse Viruses follow the same concept
6
Uses? Key logging and Spyware
7
Uses? Adware
8
Uses? Botnets or Automated Spamming
9
Other Uses Money Theft Downloading random files Crashing Computer Modifying/ Deleting Files
10
How did I get this?.exe,.vbs,.bat,.com
11
Types of Trojan Horse Viruses
13
Examples of Trojan Horse Viruses Clampi - Backdoor Kido - like Adware FakeAV - pretends it is an Anti Virus Software Redirector.U - uses Javascript to prevent detection from anti-virus software
14
How Do I Avoid Them?
16
How Do I Get Rid Of It?
18
Lessons Learned Today - Trojan Horse Viruses are used to spy, manipulate and destroy information on your computer - DO NOT download any file unless you are sure of its contents and remember to check the extension
19
Questions or Comments??
20
THE END
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.