APLawrence.com -  Resources for Unix and Linux Systems, Bloggers and the self-employed

Trojans


© September 2003 Michael Desrosiers
Web: m3ipinc.com

More Articles



If you use a high speed connection, there are hundreds of "crackers" out lurking on the internet, looking to get a remote-access trojan horse or listener installed on your system, access it and find out what's on it. This isn't an exception anymore. Trojans and worms using trojan elements are the new viruses of the Internet. A trojan infection can allow total remote access to your computer by a third party.

Unlike virus and worms, trojans do not replicate themselves so to get infected you must, in one way or another, have downloaded the program onto your computer. This most commonly occurs when you download a program that pretends to be one thing while it is actually another. Hence the origin of the "Trojan" name.

Many people believe they are protected from trojans by their anti-virus scanners. Unfortunately most virus scanners have only limited trojan detection capabilities. If you want serious protection you should install a specialized anti-trojan program in addition to your anti-virus scanner. The latest, most prevalent trojan horse programs are coded so they will disable your antivirus and disable or go right around your software firewall. Even newer, far more difficult to detect technologies with new uses for process injectors and rootkits are just beginning to appear and come into use.

Should your antivirus manage to catch a trojan, as often as not, it'll be unable to properly clean it from your system, which in some cases can cause the trojan to replicate itself and simply run again, waiting for its outside connection. So in order to provide maximum protection on your client's desktop, run both engines together.

Some of the better anti-trojan applications:

TDS-3 by DiamondCS
https://www.archive.org/details/tucows_195501_TDS-3_Trojan_Defence_Suite

Trojan Hunter by Mischel Internet Security
https://www.misec.net/trojanhunter36.jsp

BoClean by Privacy Software Corporation
https://www.nsclean.com/boclean.html

Pest Patrol by PestPatrol, Inc
https://www.pestpatrol.com

© September 2003 Michael Desrosiers All rights reserved

Got something to add? Send me email.





(OLDER)    <- More Stuff -> (NEWER)    (NEWEST)   

Printer Friendly Version

->
-> Trojans


Inexpensive and informative Apple related e-books:

Take Control of the Mac Command Line with Terminal, Second Edition

El Capitan: A Take Control Crash Course

Take control of Apple TV, Second Edition

Take Control of IOS 11

Are Your Bits Flipped?




More Articles by © Michael Desrosiers



---July 27, 2004





Printer Friendly Version

Have you tried Searching this site?

This is a Unix/Linux resource website. It contains technical articles about Unix, Linux and general computing related subjects, opinion, news, help files, how-to's, tutorials and more.

Contact us


Printer Friendly Version





Show me your flowchart and conceal your tables, and I shall continue to be mystified. Show me your tables, and I won't usually need your flowchart; it'll be obvious. (Fred Brooks, The Mythical Man Month)




Linux posts

Troubleshooting posts


This post tagged:

MDesrosiers

Security

Web/HTML



Unix/Linux Consultants

Skills Tests

Unix/Linux Book Reviews

My Unix/Linux Troubleshooting Book

This site runs on Linode





SCO Unix Sales, Support, & Service

Phone:  707-SCO-UNIX (707-726-8649Toll Free: 833-SCO-UNIX (833-726-8649)
www.SCOsales.com