Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Free
Faster access than browser!
 

Trojan horse (computing)

Index Trojan horse (computing)

In computing, a Trojan horse, or Trojan, is any malicious computer program which misleads users of its true intent. [1]

54 relations: Ancient Greek, Anonymizer, Back Orifice, Backdoor (computing), Beast (Trojan horse), Bifrost (Trojan horse), Bitdefender, Blackhole exploit kit, Botnet, Clickbot.A, Computer security, Computer virus, Computer worm, Computing, Coreflood, Cyber spying, Dancing pigs, DarkComet, Exploit (computer security), FinFisher, Flashback (Trojan), Gh0st RAT, Industrial espionage, Ken Thompson, Koobface, Magic Lantern (software), Malware, MiniPanzer and MegaPanzer, Multics, NetBus, Page view, Principle of least privilege, Privacy-invasive software, Ransomware, Remote administration, Remote desktop software, Reverse connection, Rogue security software, Shedun, Social engineering (security), Spyware, Sub7, Timeline of computer viruses and worms, Tiny Banker Trojan, Trojan Horse, Trojan:Win32/Meredrop, Troy, Turing Award, Unix, Vundo, ..., WARRIOR PRIDE, ZeroAccess botnet, Zeus (malware), Zombie (computer science). Expand index (4 more) »

Ancient Greek

The Ancient Greek language includes the forms of Greek used in ancient Greece and the ancient world from around the 9th century BC to the 6th century AD.

New!!: Trojan horse (computing) and Ancient Greek · See more »

Anonymizer

An anonymizer or an anonymous proxy is a tool that attempts to make activity on the Internet untraceable.

New!!: Trojan horse (computing) and Anonymizer · See more »

Back Orifice

Back Orifice (often shortened to BO) is a computer program designed for remote system administration.

New!!: Trojan horse (computing) and Back Orifice · See more »

Backdoor (computing)

A backdoor is a method, often secret, of bypassing normal authentication or encryption in a computer system, a product, or an embedded device (e.g. a home router), or its embodiment, e.g. as part of a cryptosystem, an algorithm, a chipset, or a "homunculus computer" (such as that as found in Intel's AMT technology).

New!!: Trojan horse (computing) and Backdoor (computing) · See more »

Beast (Trojan horse)

Beast is a Windows-based backdoor trojan horse, more commonly known in the hacking community as a Remote Administration Tool or a "RAT".

New!!: Trojan horse (computing) and Beast (Trojan horse) · See more »

Bifrost (Trojan horse)

Bifrost is a backdoor trojan horse family of more than 10 variants which can infect Windows 95 through Windows 10 (although on modern Windows systems, after Windows XP, its functionality is limited).

New!!: Trojan horse (computing) and Bifrost (Trojan horse) · See more »

Bitdefender

Bitdefender is a Romanian cybersecurity and anti-virus software company.

New!!: Trojan horse (computing) and Bitdefender · See more »

Blackhole exploit kit

The Blackhole exploit kit is, as of 2012, the most prevalent web threat, where 29% of all web threats detected by Sophos and 91% by AVG are due to this exploit kit.

New!!: Trojan horse (computing) and Blackhole exploit kit · See more »

Botnet

A botnet is a number of Internet-connected devices, each of which is running one or more bots.

New!!: Trojan horse (computing) and Botnet · See more »

Clickbot.A

Clickbot.A is an botnet that is used for click fraud.

New!!: Trojan horse (computing) and Clickbot.A · See more »

Computer security

Cybersecurity, computer security or IT security is the protection of computer systems from theft of or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.

New!!: Trojan horse (computing) and Computer security · See more »

Computer virus

A computer virus is a type of malicious software program ("malware") that, when executed, replicates itself by modifying other computer programs and inserting its own code.

New!!: Trojan horse (computing) and Computer virus · See more »

Computer worm

A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers.

New!!: Trojan horse (computing) and Computer worm · See more »

Computing

Computing is any goal-oriented activity requiring, benefiting from, or creating computers.

New!!: Trojan horse (computing) and Computing · See more »

Coreflood

Coreflood is a trojan horse and botnet created by a group of Russian hackers and released in 2010.

New!!: Trojan horse (computing) and Coreflood · See more »

Cyber spying

Cyber spying, or cyber espionage, is the act or practice of obtaining secrets and information without the permission and knowledge of the holder of the information from individuals, competitors, rivals, groups, governments and enemies for personal, economic, political or military advantage using methods on the Internet, networks or individual computers through the use of proxy servers, cracking techniques and malicious software including Trojan horses and spyware.

New!!: Trojan horse (computing) and Cyber spying · See more »

Dancing pigs

In computer security, the "dancing pigs" is a term or problem that describes computer users' attitudes to computer security.

New!!: Trojan horse (computing) and Dancing pigs · See more »

DarkComet

DarkComet is a remote access trojan (RAT) which was developed by Jean-Pierre Lesueur (known as DarkCoderSc), an independent programmer and computer security coder from France.

New!!: Trojan horse (computing) and DarkComet · See more »

Exploit (computer security)

An exploit (from the English verb to exploit, meaning "to use something to one’s own advantage") is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized).

New!!: Trojan horse (computing) and Exploit (computer security) · See more »

FinFisher

FinFisher, also known as FinSpy, is surveillance software marketed by Lench IT Solutions plc, which markets the spyware through law enforcement channels.

New!!: Trojan horse (computing) and FinFisher · See more »

Flashback (Trojan)

OSX.FlashBack, also known as the Flashback Trojan or Trojan BackDoor.Flashback, is a Trojan horse affecting personal computer systems running Mac OS X. The first variant of Flashback was discovered by antivirus company Intego in September 2011.

New!!: Trojan horse (computing) and Flashback (Trojan) · See more »

Gh0st RAT

Gh0st RAT is a Trojan horse for the Windows platform that the operators of GhostNet used to hack into some of the most sensitive computer networks on Earth.

New!!: Trojan horse (computing) and Gh0st RAT · See more »

Industrial espionage

Industrial espionage, economic espionage, corporate spying or corporate espionage is a form of espionage conducted for commercial purposes instead of purely national security.

New!!: Trojan horse (computing) and Industrial espionage · See more »

Ken Thompson

Kenneth Lane "Ken" Thompson (born February 4, 1943), commonly referred to as ken in hacker circles, is an American pioneer of computer science.

New!!: Trojan horse (computing) and Ken Thompson · See more »

Koobface

Koobface is a network worm that attacks Microsoft Windows, Mac OS X, and Linux platforms.

New!!: Trojan horse (computing) and Koobface · See more »

Magic Lantern (software)

Magic Lantern is keystroke logging software developed by the United States' Federal Bureau of Investigation.

New!!: Trojan horse (computing) and Magic Lantern (software) · See more »

Malware

Malware (a portmanteau for malicious software) is any software intentionally designed to cause damage to a computer, server or computer network.

New!!: Trojan horse (computing) and Malware · See more »

MiniPanzer and MegaPanzer

MiniPanzer and MegaPanzer are two variants of Bundestrojaner (German for state-sponsored Trojan horse) written for ERA IT Solutions (a Swiss federal government contractor) by software engineer Ruben Unteregger, and later used by the Federal Department of Environment, Transport, Energy and Communications (UVEK) to intercept Skype and more generally voice over IP traffic on Windows XP systems.

New!!: Trojan horse (computing) and MiniPanzer and MegaPanzer · See more »

Multics

Multics (Multiplexed Information and Computing Service) is an influential early time-sharing operating system, based around the concept of a single-level memory.

New!!: Trojan horse (computing) and Multics · See more »

NetBus

NetBus or Netbus is a software program for remotely controlling a Microsoft Windows computer system over a network.

New!!: Trojan horse (computing) and NetBus · See more »

Page view

A page view, or more commonly now pageview, abbreviated in business to PV and occasionally called page impression, is a request to load a single HTML file (web page) of an Internet site.

New!!: Trojan horse (computing) and Page view · See more »

Principle of least privilege

In information security, computer science, and other fields, the principle of least privilege (PoLP, also known as the principle of minimal privilege or the principle of least authority) requires that in a particular abstraction layer of a computing environment, every module (such as a process, a user, or a program, depending on the subject) must be able to access only the information and resources that are necessary for its legitimate purpose.

New!!: Trojan horse (computing) and Principle of least privilege · See more »

Privacy-invasive software

Privacy-invasive software is a category of computer software that ignores users’ privacy and that is distributed with a specific intent, often of a commercial nature.

New!!: Trojan horse (computing) and Privacy-invasive software · See more »

Ransomware

Ransomware is a type of malicious software from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid.

New!!: Trojan horse (computing) and Ransomware · See more »

Remote administration

Remote administration refers to any method of controlling a computer from a remote location.

New!!: Trojan horse (computing) and Remote administration · See more »

Remote desktop software

In computing, the term remote desktop refers to a software or operating system feature that allows a personal computer's desktop environment to be run remotely on one system (usually a PC, but the concept applies equally to a server), while being displayed on a separate client device.

New!!: Trojan horse (computing) and Remote desktop software · See more »

Reverse connection

A reverse connection is usually used to bypass firewall restrictions on open ports.

New!!: Trojan horse (computing) and Reverse connection · See more »

Rogue security software

Rogue security software is a form of malicious software and Internet fraud that misleads users into believing there is a virus on their computer, and manipulates them into paying money for a fake malware removal tool (that actually introduces malware to the computer).

New!!: Trojan horse (computing) and Rogue security software · See more »

Shedun

Shedun is a family of malware software (also known as Kemoge, Shiftybug and Shuanet) targeting the Android (operating system) first identified in late 2015 by mobile security company Lookout (company), affecting roughly 20,000 popular Android applications.

New!!: Trojan horse (computing) and Shedun · See more »

Social engineering (security)

Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information.

New!!: Trojan horse (computing) and Social engineering (security) · See more »

Spyware

Spyware is software that aims to gather information about a person or organization sometimes without their knowledge, that may send such information to another entity without the consumer's consent, that asserts control over a device without the consumer's knowledge, or it may send such information to another entity with the consumer's consent, through cookies.

New!!: Trojan horse (computing) and Spyware · See more »

Sub7

Sub7, or SubSeven or Sub7Server, is a Trojan horse program.

New!!: Trojan horse (computing) and Sub7 · See more »

Timeline of computer viruses and worms

This timeline of computer viruses and worms presents a chronological timeline of noteworthy computer viruses, computer worms, Trojan horses, similar malware, related research and events.

New!!: Trojan horse (computing) and Timeline of computer viruses and worms · See more »

Tiny Banker Trojan

Tiny Banker Trojan, also called Tinba, is a malware program that targets financial institution websites.

New!!: Trojan horse (computing) and Tiny Banker Trojan · See more »

Trojan Horse

The Trojan Horse is a tale from the Trojan War about the subterfuge that the Greeks used to enter the independent city of Troy and win the war.

New!!: Trojan horse (computing) and Trojan Horse · See more »

Trojan:Win32/Meredrop

Trojan:Win32/Meredrop is the definition (from Microsoft) of a Trojan downloader, Trojan dropper, or Trojan spy.

New!!: Trojan horse (computing) and Trojan:Win32/Meredrop · See more »

Troy

Troy (Τροία, Troia or Τροίας, Troias and Ἴλιον, Ilion or Ἴλιος, Ilios; Troia and Ilium;Trōia is the typical Latin name for the city. Ilium is a more poetic term: Hittite: Wilusha or Truwisha; Truva or Troya) was a city in the far northwest of the region known in late Classical antiquity as Asia Minor, now known as Anatolia in modern Turkey, near (just south of) the southwest mouth of the Dardanelles strait and northwest of Mount Ida.

New!!: Trojan horse (computing) and Troy · See more »

Turing Award

The ACM A.M. Turing Award is an annual prize given by the Association for Computing Machinery (ACM) to an individual selected for contributions "of lasting and major technical importance to the computer field".

New!!: Trojan horse (computing) and Turing Award · See more »

Unix

Unix (trademarked as UNIX) is a family of multitasking, multiuser computer operating systems that derive from the original AT&T Unix, development starting in the 1970s at the Bell Labs research center by Ken Thompson, Dennis Ritchie, and others.

New!!: Trojan horse (computing) and Unix · See more »

Vundo

The Vundo Trojan (commonly known as Vundo, Virtumonde or Virtumondo, and sometimes referred to as MS Juan) is either a Trojan horse or a computer worm that is known to cause popups and advertising for rogue antispyware programs, and sporadically other misbehavior including performance degradation and denial of service with some websites including Google and Facebook.

New!!: Trojan horse (computing) and Vundo · See more »

WARRIOR PRIDE

WARRIOR PRIDE is the GCHQ and NSA code name for a pair of spyware kits that can be installed on the iPhone and Android-based smartphones.

New!!: Trojan horse (computing) and WARRIOR PRIDE · See more »

ZeroAccess botnet

ZeroAccess is a Trojan horse computer malware that affects Microsoft Windows operating systems.

New!!: Trojan horse (computing) and ZeroAccess botnet · See more »

Zeus (malware)

Zeus, ZeuS, or Zbot is a Trojan horse malware package that runs on versions of Microsoft Windows.

New!!: Trojan horse (computing) and Zeus (malware) · See more »

Zombie (computer science)

In computer science, a zombie is a computer connected to the Internet that has been compromised by a hacker, computer virus or trojan horse program and can be used to perform malicious tasks of one sort or another under remote direction.

New!!: Trojan horse (computing) and Zombie (computer science) · See more »

Redirects here:

Anti Trojan, Anti-Trojan, Antitrojan, Antitrojan software, Computer Trojan, Computer trojan, Computing Trojan horse, Internet Trojan, Momovirus, Parasitic trojan, Pctrojan, Play Mp3, Play mp3.exe (trojan), Scamware, TrojWare, Trojan (computer security), Trojan (computer virus), Trojan (computing), Trojan (malware), Trojan Horse (Computing), Trojan Horse (computing), Trojan Remover, Trojan Virus, Trojan computer virus, Trojan downloader, Trojan horse (Computing), Trojan horse (computer), Trojan horse (software), Trojan horse (virus), Trojan horse program, Trojan horse virus, Trojan horses (computer), Trojan software, Trojan virus, Trojan worm, Trojanware, Web Trojans.

References

[1] https://en.wikipedia.org/wiki/Trojan_horse_(computing)

OutgoingIncoming
Hey! We are on Facebook now! »