This are 5 types of Trojan horses that attack techniques in a way to trick the security system:
1. Glieder Trojan
This Trojan as if to say "do not ignore me, I'm here just to rest this computer." When in fact the computer is entering a surveillance program.
Glieder trojan using multilevel transmission process, in which the first stage is a little malware programs will change continuously, so that anti-virus program installed in your PC will not be known as malware.
Once glieder trojan is installed in a PC, the program will try to eliminate the ability of the security system is installed, only then do his evil activities such as moving or stealing important data, or other activities according to desire the attacker.
2. Gozi Trojan
Websites can use cocket secure layer (SSL) to encode and mengamanankan important and sensitive data such as on-line banking or transactions on-line. The characteristics of websites that use SSL is a padlock in the address bar it.
Gozi trojan as if to say "locked and encoded website? No, problem! "and he would avoid these security (SSL) in a way to trick Windows OS, so as if he is part of the process of SSL.
What happens is that the data leaving the browser via Gozi trojan before the data is encrypted and sent out the PC to the network. This malicious program is not like trojans in general, he signed up to trick the operating system with layered service providers (LSPs).
3. SpamThru Trojan
These malicious programs by acting as an additional anti-virus program, so it can say "malware scan malware in your PC." When the PC to install new anti-virus better, he will block malware can not do this for up-date that can transform itself into other malware.
4. SpyAgent Trojan
The program is playing in the area of file encryption in Windows, that is when we do the encryption with the facilities provided by windows. SpyAgent is positioning itself as an administrator level user account, and use that account to encode the files. Anti-virus program installed will not suspect a file that has been infiltrated by malicious programs.
5. Jowspry Trojan
Jowspry trojan trick the PC with the technique of mask (masquerader), as though a program that are already known and recognized by the PC, the windows up-date.
This program will make a connection such as the background intelligent transfer service used by Windows programs up-date, so do not be resisted by a firewall program installed in your PC. As if to say "hi firewall, my windows up-date, do not worry la yaw!".
To anticipate the presence of the trojan-trojan in order not to nest in the PC or not to allow the trojan to act should be anticipated:
- Always up-date windows and application programs;
- Try not to open attachments or click links in e-mails that are unclear; and
- Use anti-viru program is always good.mcafee.com,kaspersky.comsymantec.com,and each other.
0 comments: