What Are The Different Types of Trojan Viruses
Having sophisticated technology does not necessarily make us comfortable and made everything easier. Later had made the public fret about the Trojan Virus. It is important to know that this virus brings some adverse effects to internet users. Understanding and kinds of Trojan Viruses can be seen below.
Getting to Know Trojan Viruses
This virus is part of malicious software that has functions – functions are not known purpose. However, when viewed broadly the nature is indeed destructive. Trojan viruses do not carry direct influence like other viruses but the potential danger is greater.
Usually, viruses are in the computer system which is a program and is not expected or inserted without the owner of a computer or laptop. The program will be activated and controlled remotely and using a timer or timer. Of course this is very detrimental to you.
The important thing to know is one indication that your computer is exposed to Trojan Virus is if your computer is connected to the internet, such as chatting or checking emails but the hard disk remains working or in a busy condition for a long time. You're also not running large applications. If this happens, it should be suspected of infiltration.
Various Trojan Viruses are already circulating and making user losses. An expert in the field of security systems, Dancho Dachev made the classification of Trojan Virus based on its characteristics such as :
Here's What Kind of Trojan Virus :
1. Remote Access Trojan
This virus is the most popular. Attackers use this type because it is easy in, its use. The process is just waiting for you to run a Trojan Virus as a server. Then if the attacker has your IP address, then the attacker has full access to your computer. Examples such as Back Orifice for victims, BOGUI. EXE for the attacker controlling the victim's computer.
2. Trojan Password Sender
The purpose of this type is to send the password on the victim's computer to a special email that is prepared. For example, the intercepted passwords are ICQ, IRC, HTTP, and other applications that require users to enter a password in the process of logging in. Usually use port 25 in sending emails. This type is clearly dangerous for the continuity of information in your password account.
3. Trojan File Transfer Protocol
The next Trojan virus is the simplest. Only has one function, namely opening port 21 and causing the ease of someone having an FTP client to enter the victim's computer without using a password also download and upload files.
4. Keyloggers
While if keyloggers, the type is simple with a function to record or record key taps when you do typing and can save in log files. If you tap the button in entering your username and password, both can be obtained also to be saved. Trojan virus can be run when the computer is online or offline. Can tell what the victim was doing and record everything.
After knowing what is Trojan Virus in this digital era, hopefully we can avoid so that your activities on the internet can be smooth and safe. Take immediate action if you find any indication as stated above.