A Trojan horse, or Trojan, is a non-self-replicating type of malware which appears to perform a desirable function but instead facilitates unauthorized access to the user’s computer system. Trojans do not attempt to inject themselves into other files like a computer virus. Trojan horses may steal information, or harm their host computer systems.
Tag Archives: Trojan
Computer Software – Malware
Today was all about malware, we covered the following section of the arrangements document using the Scholar notes and these PowerPoints.
- Classification of viruses by type of file infected:
- file virus
- boot sector virus
- macro virus
- Description of the following virus code actions:
- replication
- camouflage
- watching
- delivery
- Distinction between
- a virus
- a worm
- a trojan horse
- Description of anti-virus software detection techniques:
- use of checksum
- searching for virus signature
- heuristic detection
- memory resident monitoring
You can find the revision note here and there are links at the side of the page.