Analysis on Cyberattacks Using Trojans
Downloads
This article is about the Trojan horse from the world of computers! We will examine some issues of this so-called virus by many! We will be able to see the difference between a worm, a virus and a Trojan horse! We will also learn how to protect our computers from this Trojan horse, and we present some things about their security and how we can prevent infection with a Trojan horse.
Downloads
http://en.wikipedia.org/wiki/Trojan_horse_%28computing%29.
http://en.wikipedia.org/wiki/Computer_security.
http://securaid.com/windows/2014/08/what-are-trojans/.
http://www.faqs.org/faqs/computer-virus/faq/.
http://www.techterms.com/definition/trojanhorse.
http://www.symantec.com/business/support/index?page=content&id=TECH98539.
http://en.wikipedia.org/wiki/NetBus.
http://en.wikipedia.org/wiki/Sub7.
http://en.wikipedia.org/wiki/Back_Orifice.
http://en.wikipedia.org/wiki/Beast_%28Trojan_horse%29.
http://en.wikipedia.org/wiki/Zeus_%28Trojan_horse%29.
http://en.wikipedia.org/wiki/Trojan_BackDoor.Flashback.
http://en.wikipedia.org/wiki/ZeroAccess_botnet.
http://en.wikipedia.org/wiki/Koobface.




