A Trojan horse, or Trojan, is a destructive program that masquerades as an application. The software initially appears to perform a desirable function for the user prior to installation and execution,.
A Trojan may allow a hacker remote access to a target computer system. Once a Trojan has been installed, the hacker may have access to the computer remotely and perform various operations,-
Due to the popularity of botnets among hackers and the availability of advertising services that permit authors to violate their users' privacy, Trojan horses are becoming more common. According to a survey conducted by Bit Defender from January to June 2009, "Trojan-type malware is on the rise, accounting for 83-percent of the global malware detected in the world".
A Trojan may allow a hacker remote access to a target computer system. Once a Trojan has been installed, the hacker may have access to the computer remotely and perform various operations,-
Due to the popularity of botnets among hackers and the availability of advertising services that permit authors to violate their users' privacy, Trojan horses are becoming more common. According to a survey conducted by Bit Defender from January to June 2009, "Trojan-type malware is on the rise, accounting for 83-percent of the global malware detected in the world".
No comments:
Post a Comment