+ All Categories
Home > Documents > Trojan Horse Viruses By: Amanda Mohammed Nov. 22, 2012.

Trojan Horse Viruses By: Amanda Mohammed Nov. 22, 2012.

Date post: 31-Dec-2015
Category:
Upload: helena-booker
View: 214 times
Download: 2 times
Share this document with a friend
20
Trojan Horse Viruses By: Amanda Mohammed Nov. 22, 2012
Transcript

Trojan Horse VirusesBy: Amanda Mohammed

Nov. 22, 2012

History LessonVictory Gift!!

History LessonAt nightfall the Greek army snuck out

History LessonDestroyed City of Troy

So What?Trojan Horse Viruses follow the same concept

Uses?Key logging and Spyware

Uses?Adware

Uses?Botnets or Automated Spamming

Other Uses

Money Theft

Downloading random files

Crashing Computer

Modifying/ Deleting Files

How did I get this?.exe, .vbs, .bat, .com

Types of Trojan Horse Viruses

Types of Trojan Horse Viruses

Examples of Trojan Horse Viruses

Clampi - BackdoorKido - like AdwareFakeAV - pretends it is an Anti Virus SoftwareRedirector.U - uses Javascript to prevent detection from anti-virus software

How Do I Avoid Them?

How Do I Avoid Them?

How Do I Get Rid Of It?

How Do I Get Rid Of It?

Lessons Learned Today

- Trojan Horse Viruses are used to spy, manipulate and destroy information

on your computer

- DO NOT download any file unless you are sure of

its contents and remember to check the

extension

Questions or Comments??

THEEND


Recommended