Trojan synonyms

trō'jən
Category:
Named after the Trojan Horse of ancient Greek history, it is a particular kind of network software application developed to stay hidden on the computer where it has been installed. As with worms, Trojans generally serve malicious purposes and are in the “malware” classification. Trojans sometimes access personal information stored on home or business computers and then send it to a remote party via the Internet. Alternatively, Trojans may serve merely as a back door application. Trojans can also launch DoS attacks. Named after the Trojan Horse of ancient Greek history, it is a particular kind of network software application developed to stay hidden on the computer where it has been installed. As with worms, Trojans generally serve malicious purposes and are in the “malware” classification. Trojans sometimes access personal information stored on home or business computers and then send it to a remote party via the Internet. Alternatively, Trojans may serve merely as a back door application. Trojans can also launch DoS attacks. A combination of firewalls and anti-virus software should be used to protect networks against Trojans. New Trojans are released on a frequent basis. For example, on March 3, 2005, security experts at McAfee and SophosLabs issued alerts of a new Trojan virus called Troj/BagleD1-L. This Trojan tries to prevent various security applications (such as anti-virus and firewall software) from working by renaming files belonging to security applications so that they can no longer load. It then attempts to block access to a range of security-related Websites by altering the Windows HOSTS file. The virus is said to arrive on email messages having a ZIP attachment. After it is opened, the ZIP attachment includes a program file named “doc—01.exe” or “prs—03.exe” or some other name. If the program inside the ZIP attachment is opened, the Troj/BagleD1-L attempts to connect to one of many Websites to download more code. About, Inc. Trojan. [Online, 2004.] About, Inc. Website. http://compnet working.about.com/cs/worldwideweb/g/bldef_trojan.htm; In Brief. Security Experts Fear New Trojan on the Loose. The Globe and Mail, March 3, 2005, p. B10.
0
0
Named after the Trojan Horse of ancient Greek history, it is a particular kind of network software application developed to stay hidden on the computer where it has been installed. As with worms, Trojans generally serve malicious purposes and are in the “malware” classification. Trojans sometimes access personal information stored on home or business computers and then send it to a remote party via the Internet. Alternatively, Trojans may serve merely as a back door application. Trojans can also launch DoS attacks. Named after the Trojan Horse of ancient Greek history, it is a particular kind of network software application developed to stay hidden on the computer where it has been installed. As with worms, Trojans generally serve malicious purposes and are in the “malware” classification. Trojans sometimes access personal information stored on home or business computers and then send it to a remote party via the Internet. Alternatively, Trojans may serve merely as a back door application. Trojans can also launch DoS attacks. A combination of firewalls and anti-virus software should be used to protect networks against Trojans. New Trojans are released on a frequent basis. For example, on March 3, 2005, security experts at McAfee and SophosLabs issued alerts of a new Trojan virus called Troj/BagleD1-L. This Trojan tries to prevent various security applications (such as anti-virus and firewall software) from working by renaming files belonging to security applications so that they can no longer load. It then attempts to block access to a range of security-related Websites by altering the Windows HOSTS file. The virus is said to arrive on email messages having a ZIP attachment. After it is opened, the ZIP attachment includes a program file named “doc—01.exe” or “prs—03.exe” or some other name. If the program inside the ZIP attachment is opened, the Troj/BagleD1-L attempts to connect to one of many Websites to download more code. About, Inc. Trojan. [Online, 2004.] About, Inc. Website. http://compnet working.about.com/cs/worldwideweb/g/bldef_trojan.htm; In Brief. Security Experts Fear New Trojan on the Loose. The Globe and Mail, March 3, 2005, p. B10.
0
0
(Computer security) The software that monitors traffic in and out of a private network or a personal computer and allows or blocks such traffic depending on its perceived threat.
0
0
Any set of computer networks that communicate using the Internet Protocol. (An intranet.)
0
0
(Radio, TV) To present on or broadcast over a network
0
0
(Computers) A program that appears to be legitimate but is designed to have destructive effects, as to data residing in the computer onto which the program was loaded.
0
0
A Trojan.
0
0
Advertisement
A native or inhabitant of Dardania.
0
0
Find another word for trojan. In this page you can discover 8 synonyms, antonyms, idiomatic expressions, and related words for trojan, like: anti-virus software, denial of service (dos), firewall, internet, network, trojan horse, dardan and dardanian.