A. Introduction
This
article will learn about one's of infectious programs on a computer system.
It's become interested for me to write because the history of program name's
and the effect's after infected. I ever felt it.
B. The Story of Trojan Horse
One
upon times in Troy, a large wooden horse was left at the main gates of the City
of Troy. The Trojan think, it's a gift. They wheeled the large wooden horse
into their city. Then, they're closing the main gates.
At
the midnight, the Greek soldiers came out of the wooden horse. They opened the
main gates to give their friends from Greek soldiers came into the city.
After
all Greek soldiers in the Troy city, then they attacked the Troy Kingdom and
the citizen. Finally, they conquered the city of Troy.
It's
a Greek mythology. And I think, the programmer interested with the wooden horse
when he designed his program. It's Trojan Horse.
C. The Trojan Horse Programs
If
we compare with the history above, Trojan horse programs work almost the
same way on a computer system that infected.
This programs will
be inserted and smuggled to a computer system. Then, they appear to be
perfectly useful application programs.
Actually, they are
lying programs. They are very dangerous programs and ready to do damage. When the innocent
program is run, the Trojan horse becomes active and deletes files. And finally,
it makes data and programs on hard disk can't access.
It's mean, Trojan
Horses are doing the damage and sabotage to every a computer system that
infected. But, Trojan Horses don't replicate themselves.
Happy blogging!
Ibnu Kahfi
Related Articles:
My blog:
No comments:
Post a Comment