Using your phone's internet browser
go to:  qna.rediff.com
Click and drag this link to
the Home icon in your browser.
Q.

What is Trozen horse virus?

Tags: trozen horse
Asked by amrik singh, 06 Jun '10 11:26 pm
  Invite a friend  |  
  Save  |  
 Earn 10 points for answering
Answer this question  Earn 10 points for answering    
4000 characters remaining  
  
    
Keep me signed inNew User? Sign up

Answers (4)

1.

Trojan horse virus is a malicious security-breaking program in which a harmful code is contained inside apparently harmless programming or data in such a way that it can get hijack or control over your pc and do its chosen form of damage, such as ruining the file allocation table on your hard disk. For example, if you download what appears to be as a Free movie or music file, but when you click on it, you unleash a dangerous program that erases your hard disk, collects and sends your personal information, credit card numbers and/or passwords to a stranger or third party. They are mostly designed and disguised as a free program that was supposed to run and find and destroy computer viruses in your pc even without your prior permission.

The term comes from Greek mythology about the Trojan War, as told in the Aeneid by Virgil and mentioned in the Odyssey by Homer. According to legend, the Greeks presented the citizens of Troy with a large wooden horse in which they had secretly hidden ...more
Answered by Joseph Chacko, 07 Jun '10 12:32 am

 
  
Report abuse
Useful
 (0)
Not Useful
 (0)
Your vote on this answer has already been received
2.

You can try to google Password Genius
Answered by michelle, 24 Aug '10 02:35 pm

 
  
Report abuse
Useful
 (0)
Not Useful
 (0)
Your vote on this answer has already been received
3.

Trojan, sometimes referred to as a Trojan horse, is non-self-replicating malware that appears to perform a desirable function for the user but instead facilitates unauthorized access to the user's computer system. The term is derived from the Trojan Horse story in Greek mythology.
Trojan horses are designed to allow a hacker remote access to a target computer system. Once a Trojan horse has been installed on a target computer system, it is possible for a hacker to access it remotely and perform various operations. The operations that a hacker can perform are limited by user privileges on the target computer system and the design of the Trojan horse.

Operations that could be performed by a hacker on a target computer system include:

Use of the machine as part of a botnet (i.e. to perform spamming or to perform Distributed Denial-of-service (DDoS) attacks)
Data theft (e.g. passwords, credit card information, etc.)
Installation of software (including other malware)
Downloadin ...more
Answered by Pardeep kapoor, 07 Jun '10 12:03 am

 
  
Report abuse
Useful
 (0)
Not Useful
 (0)
Your vote on this answer has already been received
4.

A Trojan, sometimes referred to as a Trojan horse, is non-self-replicating malware that appears to perform a desirable function for the user but instead facilitates unauthorized access to the user's computer system. The term is derived from the Trojan Horse story in Greek mythology.

Trojan horses are designed to allow a hacker remote access to a target computer system. Once a Trojan horse has been installed on a target computer system, it is possible for a hacker to access it remotely and perform various operations. The operations that a hacker can perform are limited by user privileges on the target computer system and the design of the Trojan horse.
Operations that could be performed by a hacker on a target computer system include:
Use of the machine as part of a botnet (i.e. to perform spamming or to perform Distributed Denial-of-service (DDoS) attacks)
Data theft (e.g. passwords, credit card information, etc.)
Installation of software (including other malware)
Downloading o ...more
Answered by milan radadiya, 06 Jun '10 11:31 pm

 
  
Report abuse
Useful
 (0)
Not Useful
 (0)
Your vote on this answer has already been received

Ask a Question

Get answers from the community

600 characters remaining

Related Answer

Q.