Jump to content


Photo

Trojan horse?


  • Please log in to reply
3 replies to this topic

#1 pua06

pua06

    Member

  • Full Member
  • Pip
  • 2 posts

Posted 17 June 2011 - 06:50 AM

salmo allikm warhmat allah wabrakato

i do research about Trojan horse
and point that search
how can discover crime of Trojan horse
i want example of crime and how they discover Trojan horse if available?
any scientific books or Trojan simple codes can read like Trojan remote access ?


thanks so much

#2 cnm

cnm

    Mother Lion of SWI

  • Retired Staff
  • PipPipPipPipPip
  • 25,317 posts

Posted 17 June 2011 - 10:34 AM

You could read http://en.wikipedia....orse_(computing)
Microsoft MVP Windows Security 2005-2006
How camest thou in this pickle? -- William Shakespeare:(1564-1616)
The various helper groups here
UNITE

#3 pua06

pua06

    Member

  • Full Member
  • Pip
  • 2 posts

Posted 17 June 2011 - 10:53 AM

You could read http://en.wikipedia....orse_(computing)



thanks so much
but i want how they detect crime of Trojan horse

#4 cnm

cnm

    Mother Lion of SWI

  • Retired Staff
  • PipPipPipPipPip
  • 25,317 posts

Posted 17 June 2011 - 11:08 AM

Detecting malware (includes trojans) http://en.wikipedia....ivirus_software is an overview of the various strategies used by anti-trojan programs.

From the PC user's point of view, detecting a crime is a matter of discovering that something unwanted is happening. Passwords stolen, browser redirected, unwanted popups, etc. The use of stolen information is a crime, other things may be merely annoying.
Microsoft MVP Windows Security 2005-2006
How camest thou in this pickle? -- William Shakespeare:(1564-1616)
The various helper groups here
UNITE




Member of UNITE
Support SpywareInfo Forum - click the button