Download presentation
Presentation is loading. Please wait.
Published byDwayne Moore Modified over 9 years ago
1
Trojan Horse ITGD 2202 Assistant Professor Dr. Sana’a Wafa Al-Sayegh Dr. Sana’a Wafa Al-Sayegh supervision Mohammed F. Abu Lamdy
2
Definition Types of Trojan Horse Types of Trojan Horse Payloads Process 1 2 3 4 Main Category:- 5 How To Avoid From Be Infected 6 How To Remove 7 Conclusion
3
A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. A Trojan Horse is a program that installs malicious software while under the guise of doing something else. DEFINITION
4
There are two common types of Trojan horses: 1.One is ordinary software that has been corrupted by hacker. A cracker inserts malicious code into the program that executes while the program is used. Example : crack software,p2p file sharing utilities. 2.Standalone program that masquerades as something else,like a game or image file, in order to trick the user into running the program. Types Of Trojan Horse
5
There are two types of Trojan Horse : -Time Bomb and Logic Bomb -Droppers Type Of Trojan Horse payloads
6
1-Time Bomb activate on particular dates and times. 2-Logic Bomb activate on certain condition met by computer. 3-Droppers perform two tasks at once. A dropper form a legitimate but also installs a computer virus or a computer worm on a system or disk at the same time. Process
7
Do not open the unexpected attachments on emails Do not surf to the unknown website. Do not download anything from the stranger website. How To Avoid From Be Infected
8
Use the following tools : The program is called smitfraudfix siri.geekstogo.com/SmitfraudFix.php Just follow the instruction there Download Grisoft Avg 7.5 Anti-Virus, Anti-Malware.Free edition A-SQUARED emsisoft.com/en/software/free Anti-spyware comparison http://www.2-spyware.com/compare.php How To Remove
9
We need to be careful when download something. We also need an Anti-Malware and anti-virus to protect our computer from be infected by virus. We need to be a smart user because this can help us from be tricked with nice thing but behind the scenes it infects our computer with a Trojan or Worm. Conclusion
10
Reference http://au.answers.yahoo.com/question/index? qid=20070515130138AAlllwf http://en.wikipedia.org/wiki/Trojan_horse_(co mputing)
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.