Trojan Software is software that hides itself in something else that installs itself on the computer. Often it is used to deliver ads or to take over a computer to turn it into a spam spitting zombie.
1. Ethical: no, you should know ALL of the software you get and users should not have to have hidden software installed on their machines.
2. Trojan programs can be anything including a key logger, which would record your passwords and credit card numbers if you entered them into the computer.
3. Break the security of the destination computer: Yes, if a Trojan is installed say as a part of Limewire then it gains Internet access through the firewall to download and display those ads (this happened to me). Other programs could have been installed that would give an outside user a backdoor into the system so Trojans are a big problem.
According to Wikipedia: http://en.wikipedia.org/wiki/Trojan_Virus
"In the context of computer software, a Trojan horse is a program that installs malicious software while under the guise of doing something else. Though not limited in their payload, Trojan horses are more notorious for installing backdoor programs which allow unauthorized non permissible remote access to the victim's machine by unwanted parties - normally with malicious intentions. Unlike a computer virus, a Trojan horse does not propagate by inserting its code into other computer files. The term is derived from the classical myth of the Trojan Horse. Like the mythical Trojan Horse, the malicious code is hidden in a computer program or other computer file which may appear to be useful, interesting, or at the very least harmless to an unsuspecting user. When this computer program or file is executed by the unsuspecting user, the malicious code is also executed resulting in the set up or installation of the malicious Trojan horse program. (See Social engineering.)
Often the term is shortened to simply Trojan.
There are two common types of Trojan horses. One is ordinary software that has been corrupted by a hacker. A hacker inserts malicious code into the program that executes while the program is used or modified. Examples include various implementations of weather alerting programs, computer clock setting software, and peer-to-peer file sharing utilities. The other type of Trojan is a standalone program that masquerades as something else, like a game or image file, in order to trick the user into executing the file or program.
Trojan horse programs cannot operate autonomously, in contrast to some other types of malware, like viruses or worms. Trojan horse programs depend on actions by the intended victims. As such, if Trojans replicate and distribute themselves, each new victim must run the Trojan.
In the field of computer architecture, 'Trojan Horse' can also refer to security loopholes that allow kernel code to access anything for which it is not authorized."
2007-10-11 18:22:50
·
answer #1
·
answered by Dan S 7
·
0⤊
0⤋
Trojan horse is a program that installs malicious software while under the guise of doing something else. Though not limited in their payload, Trojan horses are more notorious for installing backdoor programs which allow unauthorized non permissible remote access to the victim's machine by unwanted parties - normally with malicious intentions. Unlike a computer virus, a Trojan horse does not propagate by inserting its code into other computer files. The term is derived from the classical myth of the Trojan Horse. Like the mythical Trojan Horse, the malicious code is hidden in a computer program or other computer file which may appear to be useful, interesting, or at the very least harmless to an unsuspecting user. When this computer program or file is executed by the unsuspecting user, the malicious code is also executed resulting in the set up or installation of the malicious Trojan horse program.
2007-10-11 19:32:11
·
answer #2
·
answered by Avinash M 2
·
0⤊
0⤋
You don't use it rather you get infected by such software. Stay away from it by using a good antivirus, good antispyware and a good personal firewall.
2007-10-12 22:41:42
·
answer #3
·
answered by Deepak Vasudevan 5
·
0⤊
0⤋