Trojan’s are the most dangerous of all types of attacks.
What are Trojans?
Trojans are small programs through which the hacker gain control over your system. Although, most of the Trojans are detected by anti virus programs but the frequency with which these programs are written is far more than the anti virus updating system.
Some common features with Trojans are as follows:
• Capturing screenshots of your computer.
• Recording key strokes and sending files to the hacker
• Giving full Access to all your drives and files.
• Ability to use your computer to do other hacking related activities.
Every Trojan has two parts a Client and a Server. In order to gain access, the server file must be installed in the target computer.
How this is done?
Initially this was done using a simple email. The hacker will send you an email with some sort of attachment (the Server File). The matter of that mail will make you open that attachment, when you double click on it you will see nothing but in the background the server file gets installed on your system.
Now, all the hacker has to do is just use the client file to connect to your system.
But this method became so popular that the hacker has to search for some other technique to achieve the above objective.
How many of you have played small computer games such as “shooting bird”, “catching butterflies”, “slapping some face”, etc
Now, in this technique the hacker joins two exe files into a single file i.e. the server file + the game file.
In this case when you open the attachment you will see the game but at the same time the server also gets installed on your system.
This is just one way; there are many other ways to achieve this objective. So always be careful whenever you are opening an unknown attachment, or while visiting unsafe websites, while chatting, etc.
Blog Archive
-
▼
2007
(165)
-
▼
October
(40)
- * KNOWING WHO HACKED U
- Hide in the (Network) Neighborhood
- DUMMY virus 3
- Hacking windows SEND TO MENUI know this is a very ...
- Hacking windows SEND TO MENU
- change drive icons
- Load kernel into RAM for faster startups
- Disable User Tracking To Increase resources
- Load apps Faster
- Hide the username on start menu
- TEMP2.EXE VIRUS SOLUTION
- Newfolder.exe virus SOLUTION
- Restrictions creating virus solution
- TASKMANAGER OR REGISTRY EDITOR VIRUS SOLUTION
- TASKMANAGER OR REGISTRY EDITOR VIRUS SOLUTIONguys ...
- A PRACTISE FOR HACKERS
- * MUHAHA VIRUS SOLUTION
- * PORT KNOCKING 2
- * PORT NAMES
- * NOVELL HACK
- * NETBIOS
- * NETBIOS HACKING
- * HACKING ADMIN THROUGH GUEST (EASIER WAY)
- * PORT KNOCKING
- * KEYLOGGERS
- * IP ADDRESS DETAILS
- * MAKING VERY STRONG PASSWORDS
- * PREVENTING OTHERS TO COPY UR PICS OR FILE FROM ...
- * CHANGE WINDOWS LOGON SCREEN
- * TROZEN CHECK
- * TROZENS
- * HACKING ADMIN FROM USER ACCOUNT
- * hacking msn
- * HACKER TOOLS
- * ADDING OR MODIFYING USER ACCOUNTS
- * bypassing webfilters
- * ENABLE NOTEPAD IF IT IS DISABLED
- HACK SCHOOL 2
- * BSNL HACK FOR INTERNET
- * HACKING UR SCHOOL'S PC
-
▼
October
(40)
1 comments:
Hi..I want to ask a off topic question..How to add "New" to the adjacent of post title?
Post a Comment