Trojan Horse

How to prevent Trojan Horse? Trojan may dangerous if we do not take any prevention action to avoid it. There are many ways to prevent Trojan. Firstly, avoid opening any unknown files that attached to incoming email. Those have extension such as .exe, and .bat may contain Trojan virus. Then, you must always maintain up [...]

Advertisements

Trojan Horse

"Motherhood is the strangest thing, it can be like being one's own Trojan horse!" - Rebecca West Background Trojan Horse Trojan horse is a term for a program looks typical but actually has a malicious purpose. The term comes from Greek mythology about Trojan War. A large wooden horse given to the city of Troy [...]

References

Trojan Charles P.Pfleeger & Shari Lawrence Pfleeger. (2012). Analyzing Computer Security : A Threat/Vulnerability/Countermeasure Approach. Prentice Hall. Pearson. Michael A. Davis, Sean M.Bodmer, Aron. (2010). Hacking Exposed: Malware and Rootkits. United State. Mc Graw Hill. Micheal T. Goodrich & Roberto Tamassia. (2011). Introduction to Computer Security.  Pearson https://usa.kaspersky.com/internet-security-center/threats/trojans https://sites.psu.edu/trojanblog/   Virus Chuck Easttom (2006), Computer [...]