Monday, April 27, 2009

History of Trojan Horse (Virus,Worm)

History of Traojan is as ancient as civilization.

In a one line definition these are deceptive software programs. Suppose a Software program on front /user end very useful and beautiful but in background its transfering some critical information to its coder. (s/w developer)


Trojan horses can be installed through the following methods:

* Websites containing executable content (e.g., a Trojan horse in the form of an ActiveX control)
* Software downloads (e.g., a Trojan horse included as part of a software application downloaded from a file sharing network)

* Email attachments
* Application exploits (e.g., flaws in a web browser, media player, messaging client, or other software that can be exploited to allow installation of a Trojan horse)

Also, there have been reports of compilers that are themselves Trojan horses.[citation needed] While compiling code to executable form, they include code that causes the output executable to become a Trojan horse.