plun skrev:
Barre skrev:
jag bemödade mig inte att svara tidigare eftersom jag redan svarat på den frågan två gånger.... men tredje gången gillt då.. hoppas att du förstår.
Nej... jag förstår inte...
http://en.wikipedia.org/wiki/Trojan_horse_(computing)
Förklara...
Skojar du eller!!!???!!!
Example of a Trojan horse
A simple example of a Trojan horse would be a program named "waterfalls.scr" which claimed to be a free waterfall screensaver. When run, it would instead open computer ports and allow hackers to access the user's computer remotely.
[edit] Types of Trojan horse payloads
Trojan horse payloads are almost always designed to do various harmful things, but can also be harmless. They are broken down in classification based on how they breach and damage systems. The nine main types of Trojan horse payloads are:
* Remote Access
* Email Sending
* Data Destruction
* Downloader
* Proxy Trojan (disguising others as the infected computer)
* FTP Trojan (adding or copying data from the infected computer)
* security software disabler
* denial-of-service attack (DoS)
* URL trojan (directing the infected computer to only connect to the internet via an expensive dial-up connection)
Some examples of damage are:
* erasing or overwriting data on a computer
* encrypting files in a cryptoviral extortion attack
* corrupting files in a subtle way
* upload and download files
* allowing remote access to the victim's computer. This is called a RAT (remote administration tool)
* spreading other malware, such as viruses: this type of Trojan horse is called a 'dropper' or 'vector'
* setting up networks of zombie computers in order to launch DDoS attacks or send spam.
* spying on the user of a computer and covertly reporting data like browsing habits to other people (see the article on spyware)
* making screenshots
* logging keystrokes to steal information such as passwords and credit card numbers
* phishing for bank or other account details, which can be used for criminal activities
* installing a backdoor on a computer system
* opening and closing CD-ROM tray
* harvesting e-mail addresses and using them for spam
* restarting the computer whenever the infected program is started
* deactivating or interfering with anti-virus and firewall programs
* deactivating or interfering with other competing forms of malware
[edit] Time bombs and logic bombs
"Time bombs" and "logic bombs" are types of Trojan horses.
http://en.wikipedia.org/wiki/Trojan_Horse
http://home.att.ne.jp/delta/sskn/intern ... sary2.html
http://technology.findlaw.com/law-techn ... horse.html
http://www.tsl.state.tx.us/ld/pubs/comp ... ssary.html
http://www.saol.com/glossary.asp
http://www.atharmahboob.com/courses/sec ... rewall.htm
http://www.pccomputernotes.com/pcterms/glossaryt.htm
http://www.fultoncountyinfo.com/VirusIn ... ossary.htm
Nu antar jag att du förstår... URL dropping är ju det du är bäst på!!!
Eller så försöker du provocera fram ett bråk igen