TROJAN -HORSES
ABSTRACT
Many systems have mechanisms for allowing programs written by users to be executed by users. If these programs are executed in a domain that provides the access rights of the executing user, the other users may misuse these rights. A text editor program, for example , may include code to search the file to be edited for certain keywords . If any are found , the entire file may be copied to a special area accessible to the creator of text editor. A code segment that misuses its environment is called a TROJAN HORSE.
In our computer world, a Trojan Horse is a malicious security breaking program that is disguised as something benign. For example, you download what appears to be a movie or music file, but when you click on it, you unleash a dangerous program (Trojan horse program is downloaded on your PC )that erases your disk, sends your credit card numbers and passwords to a stranger, or lets that stranger hijack your computer to commit illegal attacks.Nowadays there are so many Trojan Horses .These server-trojans are installed on somebody’s pc and person having that client-trojan can access & control somebody’s pc without his knowing.This may be dangerous.
No comments:
Post a Comment