Cybersecurity
Penetration Testing
Subjective
May 20, 2013
What are Trojan Horse programs?
Detailed Explanation
Named after the wooden horse from Greek mythology, Trojan horses are non-replicating programs that appear to be benign but actually have a hidden malicious purpose. Some Trojan horses are intended to replace existing files with malicious versions, whereas other Trojan horses add another application to a system without overwriting existing files. Trojan horses are often difficult to detect because they appear to be performing a useful function.
Discussion (0)
No comments yet. Be the first to share your thoughts!
Share Your Thoughts