Premium Essay

Trojan Virus

In:

Submitted By cliann170
Words 573
Pages 3
Trojan horse viruses got their name from the siege of Troy, when the Greeks placed a large wooden horse outside the gates of Troy. The Trojans assumed it was a peace offering from the Greeks, and moved the horse inside the gates. The wooden horse was of course filled with hidden warriors, and once inside the gates, they broke out of the horse, and demolished the Trojans. Trojan horse programs work the same way.

Trojan horses can destroy files and data, but commonly contain spyware, and even backdoor programs. Trojans are usually contained in software downloads from unknown or untrusted sources. Some people don't consider a trojan horse to be a virus, because it does not reproduce itself as a virus does, however it's ability to destroy files and install programs without the user knowing do indeed make it a virus.

When a trojan horse is being used as spyware, it monitors your computer activities, and may even record keystrokes. This information is then sent to a third party, without you being aware of it. It may also cause pop up ads to display on your computer. The real danger is that information such as passwords and credit card and banking information can be delivered to that unknown third party, opening you up for identity theft.

When the trojan horse installs a backdoor program, it sends information to the third party, making it possible for hackers to get into your system, via the backdoor, and to use the system just as if it were their own. They will often do this to look around your hard drive for information, but may also use this to send spam with your email client, from your email address.

It is important to note that not all hackers are bad. Many of them are quite reputable, and would never harm a system, or use it for devious purposes. In fact, many financial institutions hire hackers in order to find security holes in their system to make

Similar Documents

Free Essay

Dsadsa

...Introduction and Abstract Copyright(c), 1984, Fred Cohen - All Rights Reserved This paper defines a major computer security problem called a virus. The virus is interesting because of its ability to attach itself to other programs and cause them to become viruses as well. There are two spellings for the plural of virus; 'virusses', and 'viruses'. We use the one found in Webster's 3rd International Unabridged Dictionary Given the wide spread use of sharing in current computer systems, the threat of a virus carrying a Trojan horse [Anderson72] [Linde75] is significant. Although a considerable amount of work has been done in implementing policies to protect from the illicit dissemination of information [Bell73] [Denning82], and many systems have been implemented to provide protection from this sort of attack [McCauley79] [Popek79] [Gold79] [Landwehr83], little work has been done in the area of keeping information entering an area from causing damage [Lampson73] [Biba77]. There are many types of information paths possible in systems, some legitimate and authorized, and others that may be covert [Lampson73], the most commonly ignored one being through the user. We will ignore covert information paths throughout this paper. The general facilities exist for providing provably correct protection schemes [Feiertag79], but they depend on a security policy that is effective against the types of attacks being carried out. Even some quite simple protection systems cannot be proven 'safe' [Harrison76]...

Words: 8970 - Pages: 36

Premium Essay

Nt1330 Unit 3

...you to block internet access and has a locator for lost mobile devices. There is a secure cloud storage feature where you can securely store sensitive documents online and the files are unlockable using your face and voice. It is available for one month on free trial basis and costs $79.99 for the full package Question 3 When selecting antivirus software one has to first understand how the antivirus software works so as to get a better idea of the features on offer and technological terminology used by the ------------------------------ *Page 6* vendors and experts. An understanding to how the software detects viruses, how it catches it and under which circumstances it catches it in is required and the virus signature match database must be kept up to date to ensure that virus code matches can be identified as...

Words: 1861 - Pages: 8

Premium Essay

Microbiologist

...Anna Anderson PTLW CSUEB July 2011 Activity 1.1.2 MICROBIOLOGIST * Microbiologist Microbiologists study microscopic bacteria, fungi, protists, and viruses. Many of these organisms cause disease (pathogens) and many can provide useful products such as penicillin (antibiotic). * Education and/or Training Required In order to work in this field you must have at least an undergraduate degree in microbiology. Further training with a Masters or Doctorate would be required to do anything other than entry level positions. Excellent microscopy skills and training in aseptic techniques are a must. * Responsibilities and Daily Activities This job requires a strong academic background with a lot of math, chemistry, and biology. Computer and lab skills are essential. Microbiologists grow cultures of bacteria (and other organisms) in medium for study. Using aseptic technique, they grow cultures to measure and calculate the rate of growth and how it grows. They learn what can and cannot kill their organisms and if it is a pathogen, they study ways to stop or slow its growth. In the lab, they work with microscopes, grow cultures, measure the rate of growth, and perform experiments with these organisms. Lab safety is very important in their work. They would NEVER eat or drink in the lab because this could cause contamination or could infect the food they are eating. * Salary Range Microbiologists can work in the academic community, industry or government...

Words: 389 - Pages: 2

Free Essay

Chlamydia

...Chlamydia Chlamydia is one of the most common diseases in the United States. The infection is part of a 'silent epidemic' as most cases do not show symptoms and are left untreated. It can cause pelvic inflammatory disease and lead to scarring of the Fallopian tubes causing infertility and higher risk of ectopic pregnancy. The research was carried out at the Molecular Microbiology Group, at the University of Southampton, in conjunction with the Department of Virology, at the Ben Gurion University of the Negev, in Israel. Professor Ian Clarke, from the University of Southampton, says: "This is a very significant advance in the study of chlamydia and we are proud to be the first people to achieve this. "Previously people have been unable to study chlamydial genetics and this has created a barrier to the comprehensive study of this disease. "We, together with our colleagues in Israel, discovered that by treating the chlamydia with calcium ions we were able to introduce a piece of foreign DNA. "This will open up the field of chlamydia research and will enable a better understanding of chlamydial genetics. It could lead to the development of new approaches to chlamydial vaccines and therapeutic interventions." To prove that they had accessed the chlamydial genome, the research team inserted the gene for a fluorescent protein into C. trachomatis which identified the chlamydial-infected cells by making them glow green. Their paper detailing the breakthrough in the study of chlamydia...

Words: 267 - Pages: 2

Premium Essay

Das Monster

...30333, USA. The American Journal of Tropical Medicine and Hygiene [1997, 57(5):519-525] Type: Journal Article Abstract Highlight Terms Gene Ontology(1) Diseases(1) Species(7) A multi-faceted investigation was conducted in the United Arab Emirates to characterize the epidemiologic and ecologic factors underlying an outbreak of Crimean-Congo hemorrhagic fever (CCHF) noted in November 1994 among abattoir workers. A chart review was conducted among hospitalized suspected cases of viral hemorrhagic fever with onset between January 1994 and March 1995 coupled with serologic testing of available specimens for the presence of virus antigen and IgG and IgM antibodies by ELISA. Livestock handlers and animal skin processors were interviewed and tested for the presence of IgG antibody. Sera from imported and domestic ruminants were examined for antibody for CCHF virus, and ticks collected from these animals were tested with an antigen-capture ELISA. Thirty-five...

Words: 466 - Pages: 2

Free Essay

Micropara

...(350 × 270 nm) containing a double-stranded DNA genome with a size of approximately 200 kb, the ends of which are connected by covalent links  - the different OPV species cannot be distinguished by means of electron microscopy  - OPV are closely related to each other with regard to antigens and show marked homology at the genome level - The genome of the poxviruses encodes for 150–200 different genes - Unlike other DNA viruses, poxviruses replicate in the cytoplasm of infected cells in so-called virus factories (Guarnieri inclusion bodies) - Originally, four different infectious virus particles were distinguished during OPV replication: intracellular mature enveloped virus particles, intracellular enveloped virus particles, cell-associated enveloped virus particles, and extracellular enveloped virus particles. Both intracellular and extracellular viruses play an important part for pathogenesis.  - Intracellular and cell-associated viruses are involved in the spreading of the virus from cell to cell, whereas viruses released from the cell enable the dissemination within the infected organism. QUESTION 1: Which of the following can be administered to an individual infected with orthopoxvirus? a. Human Papillomavirus Quadrivalent (Types 6, 11, 16, 18) Vaccine, Recombinant b. Zoster Vaccine, Live, (Oka/Merck) c. Vaccinia Immune Globulin Intravenous (Human) d. Anthrax Vaccine Adsorbed ANSWER: C The only product currently available for treatment of complications of orthopox...

Words: 777 - Pages: 4

Free Essay

Research Writing

...ENG/102- Research Writing 3-30-2014 Sarah Ghoshal The Reality of AIDS The reality of the AIDS virus comes with bias opinions, fallacies and stereotypes of all kinds. To understand and know the truth about this virus, is to acknowledge facts and become educated. The speech "A Whisper of AIDS" by Mary Fisher addressed arguments and presented the growing concern of ignoring the severity of the disease. The speech by Mary Fisher addressed bias opinions and fallacies. As stated by Mary Fisher, "Because I was not gay, I was not at risk. Because I did not inject drugs, I was not at risk." (American Rhetoric, 2001). These fallacies and biased opinions were based on what people heard or believed, not what they knew. Mary Fisher also addressed the argument of AIDS to be recognized as a virus and not a political creature (American Rhetoric, 2001). Fisher's counter argument said, "Worldwide, forty million, sixty million, or a hundred million infections will be counted in the coming few years." (American Rhetoric, 2001). Her statements showed how ignorant society had been. People believing that they could not get infected, if they were not a drug user or not gay. The effects of her speech were global. As her speech was being broadcasted over numerous networks, 27 million people listened (Shaw, 2012). As stated by Normal Mailer, who was a guy covering the convention, "When Mary Fisher spoke like an angel that night, the floor was in tears, and conceivably the nation as well" (Shaw...

Words: 419 - Pages: 2

Free Essay

Anatomy

...Prevención Primaria Prevención Primaria Educación de la higiene, en el uso de protección en relaciones sexuales, y educación en las formas de transmisión del virus en orden de evitarlas lo más posible. Educación de la higiene, en el uso de protección en relaciones sexuales, y educación en las formas de transmisión del virus en orden de evitarlas lo más posible. Buena higiene, protección y evasión de contacto directo con agujas y/o con fluidos corporales sobre todo si se hay sospecha de infección. Vacuna contra VHB. Visita a tu médico. Buena higiene, protección y evasión de contacto directo con agujas y/o con fluidos corporales sobre todo si se hay sospecha de infección. Vacuna contra VHB. Visita a tu médico. Prevención Terciaria Prevención Terciaria Reposo, aislamiento, esterilización de utensilios y tratamiento sintomático. Reposo, aislamiento, esterilización de utensilios y tratamiento sintomático. Ejercitarse cuando el paciente se sienta capaz. Medidas dietético-higiénicas. Ejercitarse cuando el paciente se sienta capaz. Medidas dietético-higiénicas. AGENTE AGENTE DiagnosticoTemprano y Tratamientos DiagnosticoTemprano y Tratamientos Examen Físico , palpación para valorar hepatomegalia, revisión de mucosas ictericia ocular e interrogatorio clínico sobre coluria y acolia. Examen sanguíneo en busca de bilirrubinas. Tratamiento sintomático. Examen Físico , palpación para valorar hepatomegalia, revisión de mucosas ictericia ocular e interrogatorio clínico sobre...

Words: 845 - Pages: 4

Free Essay

A Practical Approach to Food Safety

...Objetivos del curos .......................................................................................................... III. Contenidos del curso ...................................................................................................... 1. Principios fundamentales de Microbiología ...................................................................... 1.1 Aspectos generales de la microbiología .................................................................... 1.2 Importancia de la microbiología para el aseguramiento de la inocuidad de los alimentos .................................................................................................................. 2. Aspectos generales de los microorganismos: Bacterias, hongos, virus ............................ 2.1 Características .......................................................................................................... 2.2 Clasificación .............................................................................................................. 2.3 Reproducción ............................................................................................................ 2.4 Parámetros intrínsecos y extrínsecos relacionados con el desarrollo microbiano ...... 2.5 Principales microorganismos en los alimentos .......................................................... 3. Enfermedades transmitidas por alimentos ....................................................................... 3.1...

Words: 10665 - Pages: 43

Free Essay

Science Project

...Henderson 1.When an organism is transfected with a virus, it triggers several mechanisms to protect itself from the viral genes affecting it. Such mechanisms involve the innate immune response of the D. Melanogaster against the virus. Another mechanism that has been discovered not too long ago is the ability of silencing viral genes using an RNA interference pathway. The Argonaute paper has focused on the RNAi pathway of D. Melanogaster. The pathway involves a RISC complex composed of Argonaute 2 , viral siRNA and other proteins that act as a “strike and search” antagonist against viral genes and silencing them. In counter-defense, Viruses try to protect themselves by encoding viral suppressors of RNAi VSR to suppress the RNAi pathway. This leads to an “arms race” of adaptation and counter-adaptation by the host and virus. An important aspect of viral genome is its ability to undergo mutations to protect its self. Viral RNA is capable of antigenic shift and antigenic drift to cause mutations in its own genome and remain adaptable in host environment. The RNA Polymerase of the virus is phage-induced, so it is going to replicate the mutated genome and is different than eukaryotic Polymerase in that manner. In turn, host will evolve according to the viral genome to silence the “new” mutated genes. The evolutionary significance of VSRs in the Argonaute paper has enabled to understand how a conserved protein VP1 from Nora Virus is able to suppress viral siRNA in D. Melanogaster...

Words: 1023 - Pages: 5

Premium Essay

Week 1

...itself. In this paper I will discuss the nine properties and how things like a virus, prion, and viroid can reproduce, but are not considered to be alive. Also how things like these that are not considered to be alive can “evolve”? Viruses reproduce via bacterial gene transfer. Prions are proteins so they replicate with the rest of the genome. Viroids are small RNA plant pathogens that do not code any protein products, therefore replicate by stealing what is needed from the host. However, it may be important to keep in mind that there is a great deal of discussion about whether viruses should be defined as live or not. They contain some of the structures and exhibit some of the activities that are common to the definition of organic life, but are missing others. Unlike viroids and prions, they contain both RNA and DNA. Scientifically they are classified in a place between supra molecular complexes and extremely simple biological entities. Viruses are composed of a single strand of genetic information encapsulated in protein. One of the most compelling arguments against viruses being live is that they lack most of the organelles necessary for biosythesis, thus reproduction. In order for a virus to reproduce it must find a suitable host. A virus is a bacteriophage, or intracellular parasite that multiplies inside a bacteria making use of the biosythetic organelles and structure that they lack. A virus expands through the mechanism of bacterial gene transfer....

Words: 345 - Pages: 2

Free Essay

I Dont Know

...condition. With the rising predominance of HIV/AIDS, organizations are progressively worried about the effect of the infection on their organizations concerns that are all around established. At the broadest level, organizations are subject to the quality and essentialness of the economies in which they work. HIV/AIDS raises the expenses of working together, decreases profitability and brings down general interest for merchandise and administrations. It in this way makes sense to put resources into avoidance, mind and bolster programs to stem declining business efficiency and benefit. AIDS definitely have an impact on the employers because sickness keeps workers away from work and it effects the work productivity, it is important to observe the virus and make sure that the workplace is safe and well...

Words: 393 - Pages: 2

Free Essay

Defense Mechanisms

...MICROBIOLOGIA PRIMER PARCIAL Estudio de los organismos vivos  Virus, Bacterias, Parásitos y Hongos VIRUS HONGOS    Organismo más pequeño conocido Compuesto de ADN o ARN (Nunca ambos) Rodeado por una capa proteica    Gran tamaño Más complejos que bacterias Material genético organizado  Núcleo  Parásitos intracelulares estrictos  Regulación proteica regulada por el retículo endoplásmico BACTERIAS  Mayor tamaño    Contienen ADN y ARN Información genética NO organizada dentro del núcleo División libre  Excepto Chlamydia y Rickettsias (Son intracelulares estrictos)  Pared Celular o Gram (+)  Peptidoglicano grueso  Carece de lípidos y proteínas  Contienen ácidos teicoicos  Virulencia  Carbohidratos  Constituyen la capsula (Resistencia a fagocitos) o Gram (-)  Más agresivas  Peptidoglicano delgado  Pared celular con 2 capas   Espacio periplasmático  Enzimas hidrolíticas  Destruyen  Membrana externa: Filtro molecular que regula la entrada de moléculas de 700 Daltons, tiene una capa externa compuesta por lipopolisacaridos (LPS)  LPS: Molécula anfipática (Extremo hidrofóbico y otro hidrofílico), contiene toxinas termoestables que pueden producir la muerte dentro de 2 a 3 horas, causa agregación plaquetaria, es pirógeno y compuesta por 3 regiones. 1. Lípido A hidrofóbico  Parte exterior del LPS  Endotoxina que produce shock séptico 2. Polisacárido Central  Une lípido A –...

Words: 4174 - Pages: 17

Free Essay

Disease & Evolution

...Disease and Evolution The human body has been plagued with diseases since the beginning of time—pathogens like viruses and bacteria have made us privy to Mother Nature. As humans evolve, so do the diseases we are susceptible to. Some diseases that were once rare have become common, others have disappeared and newer, more daunting ones have emerged. Many of these changes have taken place in the wake of important transformations in human civilizations and ecology. It is therefore feasible to propose that diseases succeed and fail in response to humanity's advances. Natural selection is unable to provide us with perfect protection against all pathogens, because they tend to evolve much faster than humans do. E. coli, for example, with its rapid rates of reproduction, has as much opportunity for mutation and selection in one day as humanity gets in a millennium. And our defenses, whether natural or artificial, make for potent selection forces. Pathogens either quickly evolve a counter defense or become extinct. Diseases such as AIDS, Ebola, Polio have shown their wrath and humans have sought to find cures and treatment options. By definition, disease is essentially “a disorder of structure or function that produces specific signs or symptoms or that affect a specific location (not just from a physical injury)” (WHO, 2007). The true boundaries and limitations of disease remain elusive. Healthcare specialists and researchers use “normal” conditions as their basis in order to understand...

Words: 2793 - Pages: 12

Premium Essay

Generalized vs Specialized Transduction

...Generalized and Specialized Transduction There are several mechanisms in which bacteria transfer genes with one another. Vertical gene transfer is the transfer of genetic material during cell division. Horizontal gene transfer, on the other hand, is the transfer of genetic material between different species of bacteria; three types are found. Conjugation is the transfer of DNA by direct contact with the cell. Transformation is the uptake of genetic material from the surrounding. Transduction is the transfer of genes via bacterophages. Two kinds of bacterial transductions can be found: generalized and specialized. Viruses are unable to replicate on their own. To do so, they infect a cell and force it to make copies of itself. In the case of generalized transduction, a virulent phage infects the bacterial cell by attaching to a receptor area and injecting its nucleic acid into the cell. The host DNA is broken into smaller fragments, replicated and translated. When phages are assembled, they occasionally carry a piece of the bacterial DNA picked at random. Any segment of the bacterial DNA can be assembled in the new phage. The cell then enters the lytic phase, releasing the phage. This phage then infects another cell, transferring the bacterial DNA which recombines with the host’s chromosome. In specialized transduction, only a few specific genes are transferred from one bacterial cell to another and it requires a certain type of phage, called temperate bacteriophage. When it...

Words: 455 - Pages: 2