Neal Mason         IT Virus Research        11/10/02

Backdoor.Trojan hourse

  • This Trojan opens a port to allow a hacker to control the infected system.
  • Within the larger grouping, there are Trojans that share very similar characteristics. These are given specific names and include any Trojans with "Backdoor." at the beginning of the name, such as Backdoor.Subseven and Backdoor.Netbus.
Join now!

A Trojan can be sent as a file and can be combined with a game or a program. When you open the Trojan you cannot tell you have opened anything. The person who is hacking you will need your IP address in order to get into your computer then they can do what they want with your computer and even listen and look at your though your web cam.

A Trojan can be deleted by downloading a program called Trojan remover. But there is a easy way to avoid downloading viruses and that is to only take files from people ...

This is a preview of the whole essay