Trojan Horse Virus and Its Prevention

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

Trojan Horse Virus and Its Prevention

BY : Rowaim Safdar

The rapid growth of computer network technology has become an important element of human existence, work, and
education in recent years. However, with the rise in popularity of the Internet, Viruses, Trojans, and other such words
have become common place a few popular network vocabulary. According to studies, the majority of computer users
are more or less affected by computer viruses. As a result, the problem of network security must be prioritised. The
Trojan virus was the subject of the paper.The idea, features, and classifications of the Trojan virus, as well as the harm it
does, were first described in the paper, and then the method and methods of the Trojan's propagation were discussed.
It was also the first to introduce Trojan malware loading and concealing technologies. The paper's last section
concentrated on preventive methods, and it made acceptable suggestions to users, as well as prevention tips to increase
network security.

The full name of the horse virus is "Trojan horse," and it is now a unique network assault software. It's software that
uses a remote control to control another computer using a certain program. This virus can infiltrate a user's computer
via its implantation feature or the characteristic of an accessory that carries a virus to steal personal information and
passwords, mess with data, or delete files. Because the Trojan horse virus may be used by an attacker to carry out a
command, the computer system may be destroyed as a result of their illicit actions. Trojan horse is very dangerous since
a hostile attacker may remotely access a user's computer and use the virus to steal or maliciously edit files, spy on
system information, and steal personal information.a variety of commands and passwords, as well as the formatting of
users' data. Furthermore, the Trojan horse virus generally captures keyboard operations using a keyboard recorder, and
subsequently steals the E-bank account and password. By acquiring accounts and passwords, attackers can directly take
the wealth of users. Trojan horse, on the other hand, might make the host system vulnerable to additional viruses.

Both individuals and the computer network should be protected against Trojan infiltration.

• Never download and operate software or program with ease.


• Never open e-mail in mailbox with ease
• Never use software or a program that was provided to you by a friend.
• Never go to strange websites.

Computer viruses are on the rise in general, thanks to the rapid advancement of internet technology. Because the
varieties and numbers of computer viruses are continually expanding, they pose a greater threat to humans and the
entire globe. As a result, in order to design the most efficient means of combating assault in the future, we must
continually focus on the growth trend and momentum of computer network viruses. Meanwhile, we should continue to
publicise the substance of our work in order to avoid network viruses and to develop efficient preventative techniques
and channels.

You might also like