Trojan Horse Virus Siti Nur Syafiqah bt. Mat Noor 4 Nilam 2009
Trojan Horse Virus
Siti Nur Syafiqah bt. Mat Noor
4 Nilam
2009
Presentation Objective
At the end of the presentation, you will understand What is a Trojan horse? Types of Trojan Horse? How do we avoid getting infected in the future? How do we get rid of trojans?!?
Trojan Horse
a program that
installs malicious
software while
under the guise
of doing
something else.
malicious code that is well disguised and claims
to be a useful program
or legitimate software.
pose as useful programs
but contain hidden commands.
does things to the user’s
computer that the user does
not want or intend
computer threats that perform a desirable function but in fact
performs undisclosed malicious functions
that allow unauthorized access to the host machine.
Types of Trojan HorseTypes of Trojan Horse
Trojan Horse
A useful software program that is corrupted by hacker
and cracker inserts malicious code into the program
that executes while the program is used.
Act as key loggers that send what
all you are typing to an outside system.
How do we avoid from getting infected?
NEVER download anything from people or sites which you were not 100% sure about it.
You must be sure what the file is before opening it, because many trojans will automatically try to spread themselves to friends in an email address book or on an IRC channel.
Beware of hidden file extensions! To reduce the chances of being tricked, unhide those troublesome extensions.
NEVER use features in your programs that automatically get or preview files.
How do we remove Trojans?!?
1. You can restore your computer
2. Try optimizing Internet Explorer Browser
3. Downloading anti-virus software
4. Use the following tools:
The program is called smitfraudfixhttp://siri.geekstogo.com/smitfraudfix.p...-- Just follow the instruction there
then do an Online ewido scanhttp://www.ewido.net/en/onlinescan/...Just remove all those infections
ConclusionConclusion
We need to be careful when download something. We also need an anti-virus to protect our computer from be infected by virus.
We need to be a smart user because this can help us from be tricked with nice thing but behind the scenes it infects our computer with a Trojan or Worm.
ReferencesReferences
http://antivirus.about.com/b/2006/05/31/whats-a-trojan-horse-virus.h
tm http://www.irchelp.org/irchelp/security/trojan.html http://www.secureurpc.com/secureurpc-articles/trojan-horse-comput
er-virus.php http://www.pcmantra.com/Images/spy-mid.gif http://www.securitysoftwarezone.com/modules/news/files/trojan-hor
se.gif http://www.intego.com/pix/virusMP3.gif http://www.innovonics.com/graphics/weaklink.gif http://www.msconsulting.com/images/MSS-Attack.jpg www.newscitech.com http://au.answers.yahoo.com/question/index?
qid=20070515130138AAlllwf
Group MembersGroup Members
Najihah bt IsmitNajihah bt Ismit Fatin Hazwani bt. Dul FatthahFatin Hazwani bt. Dul Fatthah Jothi Letchumy a/p P.Mahendra KumarJothi Letchumy a/p P.Mahendra Kumar Muna bt. OsmanMuna bt. Osman Eunice Quah Xuet - WyneEunice Quah Xuet - Wyne Thum Jing YeeThum Jing Yee Mah Sok WanMah Sok Wan Keethanjeli a/p KaliyapanKeethanjeli a/p Kaliyapan Elil Bharati a/p SanggaElil Bharati a/p Sangga PriyatharusiniPriyatharusini Mas Ewani bt. Mohd. YusoffMas Ewani bt. Mohd. Yusoff Anastasia bt. Mohd Shah Nizam ShermanAnastasia bt. Mohd Shah Nizam Sherman Azhani bt AziziAzhani bt Azizi