![]() ![]() The different types of Trojan Horses are as follows-ġ) Remote Access Trojans :- Abbreviated as RATs, a Remote Access Trojans are potentially the most damaging, designed to provide the attacker with complete control of the victim's system.Ģ) Data Sending Trojans :- A type of a Trojan horse that is designed to provide the attacker with sensitive data such as passwords, credit card information, log files, e-mail address or IM contact lists. "A Trojan horse is an apparently useful program containing hidden functions that can exploit the privileges of the user, with a resulting security threat.". "A Trojan Horse, or Trojan, is a term used to describe malware that appears, to the user, to perform a desirable function but, in fact, facilitates unauthorized access to the user's computer system".
0 Comments
Leave a Reply. |