The characteristics of Trojan

As the popularization of the Internet, the viruses are widespread beyond imaging. Trojan, widely known as one of the viruses, is trying to control another computer by using powerful client-server model, which is a central computer provides information and processes to multiple end-user computers. These computers that completely are invaded by Trojan are servers, and hackers use controller to operate servers. Once controller connects with Trojan, the client will own most power of the server so that the client can issue commands in the computer, such as brows, move, copy, and delete documents.

Although there are thousands types of Trojan, they share some same characteristics. The following four of them are more basic. They’ve made people annoyed because they were hard to deal with.

The first one is its concealment. Trojan is similar to remote control (IT Technical Services) but remote control software like team viewer is friendly. So it doesn’t have concealment. On the opposite side, the goal for Trojan is to arrive stole remote control. If the Trojan cannot be elusive, it is meaningless. Secondly, Trojan has strong fraudulence. Trojan is able to use a skill that named bundle deception; binding an undisclosed document has dangerous resulted program with a normal document (Fraud Awareness).

Besides, every kind of Trojan can open terminal automatically by using the communication means of client-server model. In order to open a door, it will connect with some rarely used terminals in TCP or IP protocol (Technology). Finally, Trojan has the ability of self-repair. If you didn’t kill every Trojan in your computer, it will recovery and attack computer because when Trojan intruded into computer, it would immediately finish duplexing backup sets in some corners.

Reference:

“Trojans.” Trojans. IT Technical Services, 17 May 2007. Web. 19 Apr. 2014.

“Fraud Awareness.” Online. N.p., n.d. Web. 19 Apr. 2014.

“Types of Trojan Horse Viruses.” – Technology. N.p., n.d. Web. 19 Apr. 2014.

“What Are Trojans?” Malwarebytes Unpacked. N.p., n.d. Web. 19 Apr. 2014.

Leave a Reply