It is a malicious program disguised as legitimate software. It cannot replicate itself, in
contrast to some other types of “malware” like worms and viruses but they can be contained within
a worm. Depending on their purpose, a Trojan can be destructive or a resource hog and is almost
always considered a root compromise.
Example: Back Orifice, NetBus, SubSeven
No comments:
Post a Comment