Trojan, also known as Trojan virus, refers to controlling another computer through a specific program (Trojan program). Trojans usually have two executable programs: one is the control end and the other is the controlled end. The name Trojan horse comes from ancient Greek legend (the story of the Trojan horse trick in Homer's epic poem, the word Trojan originally means Trojan, which refers to the Trojan horse, that is, the story of the Trojan horse trick).
"Trojan horse" program is a relatively popular virus file at present. Unlike ordinary viruses, it does not reproduce itself and does not "deliberately" infect other files. , it attracts users to download and execute it by disguising itself, and provides the Trojans with a portal to open the planted host, so that the Trojan can destroy and steal the files of the planted, and even remotely control the planted host. The emergence of Trojan viruses seriously endangers the safe operation of modern networks.
Trojan horse" is somewhat similar to remote control software that is often used in computer networks. However, because remote control software is a "well-intentioned" control, it is usually not concealable; "Trojan horse" is completely On the contrary, what the Trojan wants to achieve is "stealing" remote control. If it is not very concealed, it is "worthless".
Recommended courses:PHP Tutorial.
It refers to controlling another computer through a specific program (Trojan program). Trojan horses usually have
two executable programs: one is the client, which is the control terminal; The other is the server, which is the controlled end. What is implanted into the victim's computer is the "server" part, and the so-called "hacker" uses the "controller" to enter the computer running the "server". A Trojan horse program is run. After the "server" is installed, one or several ports will be opened on the victim's computer, so that hackers can use these open ports to enter the computer system, and security and personal privacy will not be guaranteed! The designer of the Trojan horse wants to To prevent the Trojan from being discovered, various means are used to hide the Trojan. Once the Trojan service is running and connected to the control end, the control end will have most of the operating rights of the server, such as adding passwords to the computer, browsing, moving, copying, and deleting files. , modify the registry, change computer configuration, etc.
With the development of virus writing technology, Trojan horse programs pose an increasing threat to users, especially some Trojan horse programs that use extremely cunning means to hide themselves. It makes it difficult for ordinary users to detect poisoning.
Principle
A complete Trojan horse suite program contains two parts: the server (server part) and the client (Controller part). What is implanted into the other party's computer is the server, and the hacker uses the client to enter the computer running the server. After running the server of the Trojan horse program, a process with a name that easily confuses the user will be generated. Secretly open ports and send data to designated locations (such as online game passwords, instant messaging software passwords and user Internet passwords, etc.). Hackers can even use these open ports to enter the computer system.
Trojan horse programs cannot automatically Operationally, a Trojan horse is a program that contains or installs a malicious program that may appear to be useful or interesting (or at least harmless) to an unsuspecting user, but is actually harmful when it is run . The Trojan horse will not run automatically. It is implicit in the documents that some users are interested in and comes with it when the user downloads it. When the user runs the document program, the Trojan horse will run, and the information or documents will be damaged and lost. Trojan horses are different from backdoors. Backdoors refer to secret functions hidden in programs, which are usually set up by program designers to allow them to enter the system at will in the future.
There are two types of Trojan horses, universal and transitive. , universal is controllable, while transitive is uncontrollable and a permanent operation.
The above is the detailed content of Are Trojans viruses?. For more information, please follow other related articles on the PHP Chinese website!