English Deutsch Français Italiano Español Português 繁體中文 Bahasa Indonesia Tiếng Việt ภาษาไทย
All categories

Let's say I have a trojan keylogger thingy on my computer. It will take all my info without me knowing right? And how would the person who gave me the trojan get it?

2006-06-24 17:45:28 · 7 answers · asked by Sylvia S 1 in Computers & Internet Security

7 answers

actually a trojan is a combination of two parts!
1)server
2)client
The person who wants to access and wants to know your info tries to get that "server" file to be executed in your computer by someway!making you a victim to him.Then from his computer he will connect to you system by using this client.Just imagine the same system like in yahoo messenger.The yahoo messenger when you log in will connect to the server of yahoo right?Just like in the same way the client of the trojan would connect to the server.The person would know your ip address so he will type in that server to connect to this ip and it will connect!The server program in your computer waits at its default port for a signal from its master(client).got it?the server when installed in your computer firstly it will take every function of your computer into its command and it will logs every key stroke on yourkeyboard,passwords in your browser and very info and make a backdoor from your computer to make access to the person to enter your system and have a look at the files just like browsing his own files in his windows explorer and he copies or deletes or what the act is upto him!i hope you understood!

2006-06-24 17:55:06 · answer #1 · answered by thenerd 2 · 0 0

Simply stated it will connect to the Persons Computer like a lot of your Running Programs do to get updates. Take a Virus Protection Software for example. Everyday it gets new virus updates, it may do this in the background without your knowledge! Some programs like Adobe Reader have a pop-up tells you it need to update and you can click "Now" or "Later". A good Firewall may catch the Trojan and ask if you want it to Access the Inet, or, if you want it to access your computer, how ever it being done.

2006-06-24 18:02:22 · answer #2 · answered by Snaglefritz 7 · 0 0

some trojans are such like that they e mail in hidden mode to the trojan attacker about the keylogs.u will not know that that virus e mailed ur activities to attacker.if u want to prevent trojan then install any good anti trojan software.

2006-06-24 17:51:28 · answer #3 · answered by bond_thejamesbond 1 · 0 0

Someone builds a trojan into another program. So when you download or send this program you and others get it. Don't download anything suspisious and update your virus protection often.

2006-06-24 17:49:58 · answer #4 · answered by Anonymous · 0 0

It gets uploaded online, to the hackers computer. The hacker will probably have a program that connects online to retrive the info.

2006-06-24 17:50:12 · answer #5 · answered by df747jet 4 · 0 0

Through an email, through a shifty website, through a download that had it, through an actual hack attack on their computer, etc.

The point is that it travels to other computers often times through email.

Hope that this helps.

Buddhadan

2006-06-24 17:51:10 · answer #6 · answered by buddhadan 3 · 0 0

He can set the torjan to send him the logs by email.

2006-06-29 22:56:57 · answer #7 · answered by bobm012 4 · 0 0

fedest.com, questions and answers