Thursday, April 11, 2013

What is TROJAN HORSE


It is a malicious program disguised as legitimate software. It cannot replicate itself, in
contrast to some other types of “malware” like worms and viruses but they can be contained within
a worm. Depending on their purpose, a Trojan can be destructive or a resource hog and is almost
always considered a root compromise.
Example: Back Orifice, NetBus, SubSeven

No comments:

Post a Comment