Features of Trojan Horse

  • It steals information like a password and more.
  • It can be used to allow remote access to a computer.
  • It can be used to delete data and more on the user’s computers.

Trojan Horse in Information Security

Any malicious software intended to harm or exploit any programmable device, service, or network is referred to as malware. Malware includes computer viruses, worms, Trojan horses, ransomware, spyware, and other malicious programs. In this article we will understand about Trojan Horse virus.

Similar Reads

What is a Trojan Horse?

The name of the Trojan Horse is taken from a classical story of the Trojan War.  It is a code that is malicious in nature and has the capacity to take control of the computer. It is designed to steal, damage, or do some harmful actions on the computer. It tries to deceive the user to load and execute the files on the device. After it executes, this allows cybercriminals to perform many actions on the user’s computer like deleting data from files, modifying data from files, and more. Now like many viruses or worms, Trojan Horse does not have the ability to replicate itself....

Features of Trojan Horse

It steals information like a password and more. It can be used to allow remote access to a computer. It can be used to delete data and more on the user’s computers....

How Does Trojan Horse Work?

Unlike computer viruses, a Trojan horse requires a user to download the server side of the application for it to function because it cannot manifest by itself. This means that for the Trojan to target a device’s system, the executable (.exe) file must be implemented and the software installed....

Examples of Trojan Horse Virus Attacks

Trojan assaults that infect systems and steal user data are to blame for significant damage. Typical instances of Trojans include:...

Uses of Trojan Horse

There are many ways that it can be used :...

Types of Trojan Horse

Now there are many Trojans which is designed to perform specific functions. Some of them are: –...

Advantage of Trojan Horse

It can be sent as an attachment in an email. It can be in some pop-up ads that we find on the web page. It can be used to allow remote access to a computer. It can be used to delete data and more on the user’s computers....

Disadvantages of Trojan Horse

It can’t manifest by itself. It requires the implementation of the .exe files. It remains undetected and starts its execution when the user is doing any online transaction activity. the system or the device where it has been affected will be slow. The user can also experience a direct shutdown of the computer. The user will experience the files to be opening much slower....

Prevention from Trojan Horse

The most basic prevention method: –...

FAQs on Trojan Horse

Q.1: Who developed the first Trojan?...

Contact Us