Selasa, 30 Maret 2010

TROJAN IDENTIFICATION AND PREVENTION

TROJAN IDENTIFICATION AND PREVENTION

Trojan Horse or better known as "Trojan horse" in the computer system is part of a digital infection whose presence is not expected by the owner of the computer.
Trojan consists of functions of unknown purpose, but an outline has destructive properties. Trojans go into a computer through a network inserted by the surf at the physical media.


Trojans do not take effect directly as well as computer viruses, but the potential dangers can be far greater than computer viruses.
Trojan can be activated and controlled remotely or using a timer. Remote control as the Remote Administration Tools, which is the server version will be controlled by the attacker through his version of the client. Many things can be done by an attacker if the victim computer has been controlled. Certain ports open unusual indicate current activity trojan


Trojan handling can be done in two ways, namely prevention (preventive) and treatment (recovery).
Prevention efforts conducted prior to the infection, the attempt to keep the system has no security holes. Treatment efforts after an infected system, the attempt to close the security holes that have been exploited and eliminate the cause of infection.

Understanding of the intricacies Trojans need to know Internet users to avoid or minimize attacks on him and be able to do the treatment if infected


forr details klik here
to download

Digg Google Bookmarks reddit Mixx StumbleUpon Technorati Yahoo! Buzz DesignFloat Delicious BlinkList Furl

0 komentar: on "TROJAN IDENTIFICATION AND PREVENTION"

Posting Komentar