History of Traojan is as ancient as civilization.
In a one line definition these are deceptive software programs. Suppose a Software program on front /user end very useful and beautiful but in background its transfering some critical information to its coder. (s/w developer)
Trojan horses can be installed through the following methods:
* Websites containing executable content (e.g., a Trojan horse in the form of an ActiveX control)
* Software downloads (e.g., a Trojan horse included as part of a software application downloaded from a file sharing network)
* Email attachments
* Application exploits (e.g., flaws in a web browser, media player, messaging client, or other software that can be exploited to allow installation of a Trojan horse)
Also, there have been reports of compilers that are themselves Trojan horses.[citation needed] While compiling code to executable form, they include code that causes the output executable to become a Trojan horse.
Monday, April 27, 2009
Subscribe to:
Post Comments (Atom)

No comments:
Post a Comment