While the original Trojan Horse was used to sneak Greeks into Troy, the common meaning today actually refers to the payload that gets deposited on your computer.
Trojans typically grant a hacker remote access to your computer. From there, they use this open door to install whatever they choose. Several of these allow the hacker to open the CD tray on your computer or make it beep just for fun.
In this article Custom Trojans: The Next Big Thing - Security you will learn all about Trojans and how to protect your computer.
1 June 2006
Custom Trojans: The Next Big Thing
Αναρτήθηκε από grhomeboy στις Thursday, June 01, 2006
Ετικέτες Internet Security
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment