Labels

Thursday, October 30, 2014

How To Identify The Trojan Horse

A. Introduction
This article will learn about one's of infectious programs on a computer system. It's become interested for me to write because the history of program name's and the effect's after infected. I ever felt it.


B. The Story of Trojan Horse
One upon times in Troy, a large wooden horse was left at the main gates of the City of Troy. The Trojan think, it's a gift. They wheeled the large wooden horse into their city. Then, they're closing the main gates.

At the midnight, the Greek soldiers came out of the wooden horse. They opened the main gates to give their friends from Greek soldiers came into the city.

After all Greek soldiers in the Troy city, then they attacked the Troy Kingdom and the citizen. Finally, they conquered the city of Troy.

It's a Greek mythology. And I think, the programmer interested with the wooden horse when he designed his program. It's Trojan Horse.


C. The Trojan Horse Programs
If we compare with the history above, Trojan horse programs work almost the same way on a computer system that infected.

This programs will be inserted and smuggled to a computer system. Then, they appear to be perfectly useful application programs.

Actually, they are lying programs. They are very dangerous programs and ready to do damage. When the innocent program is run, the Trojan horse becomes active and deletes files. And finally, it makes data and programs on hard disk can't access.

It's mean, Trojan Horses are doing the damage and sabotage to every a computer system that infected. But, Trojan Horses don't replicate themselves.


Happy blogging!

Ibnu Kahfi


No comments:

Post a Comment