Author Box
Articles Categories
All Categories
Articles Resources

Trojans: The Enemy in Disguise

February 16, 2012 | Comments: 0 | Views: 185

For all of us that have watched the movie Troy remember what the Greeks did. Yeah they won the battle by using deception. It is all in the game of war. The point was not about winning or losing the battle but rather how they did it. The Greeks hid under the disguise of a giant horse, which the Trojans thought was a parting gift.

They forgot, who gives gifts nowadays, and that being a giant horse made of wood. A horse made of wood for God's sake! How do you cut so much wood without chainsaws, and carry them to make a horse? They surely did not have highways back then. Things to consider when something looks too good to be true.

Well apparently the Trojans did not bother taking that into consideration and took the horse as a present. And what a gift it was, filled with Greek soldiers, that came out of hiding when the rest of the world was asleep. I guess they did not have guards working in shifts like we do now.

So when the rest of the world (world refers to Trojans' occupied land) was sleeping they managed to ravage the city, took down the king. We all know when you kill a king you become a king replacing him, ah the good old days. The Greeks were in-charge, and just when the Trojans thought they had won, they lost it big time.

They put their guards down and let their sworn enemies in, talk about not having customs to check shipments. The story of Troy has been told. So what does this have to do with computing? Well two things, one the name Trojan horse and second the tactics. Unlike scare tactics this will make you cry for a long time.

In the world of computing a Trojan horse does exactly what the Greeks did. Impersonate something that is harmless or appealing and when the time is right unleash the fury. A Trojan horse is a software that promises to do something, but does something else as well.

It might to what it said, but the problem is it tries to do more. It then ravages your system, looking for connections back to its creator or inviting more of its friends. Yeah I know everyone has an anti-virus installed, but the Trojan horse is not a virus at first but contains codes that are viruses.

Trojan Horses are normally downloaded as software, or when you click an unknown link on the internet. The anti-virus does not stop any installers from coming in, so here they come with all their wits. Once in a Trojan horse can act as a keylogger, i.e. it takes into account all the keys that you are pressing on your keyboard.

This information is then sent to the creator of the Trojan horse. This would not sound much when internet banking was not available, since you now do banking online it is something to worry about. Apart from that Trojan horse also opens back doors to allow more of its friends in. They seriously jeopardize privacy and security.

So now let's see what we can do, firstly guys don't surf too much porn, these software lurk over there like a snake under dead leaves. Secondly and this is actually most important try not to use pirated software, try to get this straight nothing is for free, you should have learned that from the Trojans by now.

Apart from that, anything on the internet that claims it can do something do Google the name. You can always check on something, on what it really is. You have to give the advertiser benefit of the doubt. When you Google, you can actually see people that have been cheated (if they have been) before this post in forums or blogs.

Do read the posts and blogs thoroughly as you might discover some surprises at the end. Never click on any pop-ups. Always keep your computer's anti-virus updated, always update windows, please don't forget to install only original software. If you can't afford original software, there are plenty of open source software.

Open source software might no be as good as something you have to buy, but it is good to improvise legally. Well you wouldn't want someone to steal from you would you? Well I hope this helped, to shed some light on what a Trojan horse is and what it can do. Next time we shall discuss about other threats.

Oh one more thing, the soldiers in the horse did open the gates of Troy and let an entire Greek army in. Just like it does in a computer.

This article was published on and is written by the same author as the one posting this article.

Source: EzineArticles
Was this Helpful ?

Rate this Article

Article Tags:

Trojan Horse


Trojan Horse Disguises


What Is A Trojan Horse


Computer Security


Avoid Trojan Horse

Windows 8 will change the way you work and play, says Microsoft and we agree. Nearly all of the previous iterations of the Windows OS have been evolutionary but Windows 8 is set to change all that.

By: Sakshi Sharma l Computers & Technology > Mobile Computing l April 03, 2013 lViews: 659

Many antivirus programs available today have various features but it entirely depends on the user to make the best choice from among these different computer virus protection programs online. Before

By: Alex l Computers & Technology > Software l December 28, 2012 lViews: 368

You can add a new color to your entertainment life with iskysoft video converter for mac & iskysoft dvd creator for mac and make your Christmas holidays all the more special. iskysoft video

By: Zaithyn Galter l Computers & Technology > Software l December 23, 2012 lViews: 1070

The choices you make regarding the type of recruiting software you choose to use are important. Being an informed consumer is essential to getting a system or components that complement systems of

By: Maria Warne l Computers & Technology > Software l December 14, 2012 lViews: 305

The Cisco certification has become the most popular IT training in recent days and it offers three different levels of these certifications include as: associate, professional and expert-level.

By: sandidas chakma l Computers & Technology > Certification Tests l December 11, 2012 lViews: 236

Millions of prospective 12th standard students are gearing up their preparations for the Joint Entrance Exam for engineering seats. From 2013, it has been decided by the IITs, CBSE, JEE organizing

By: Sarkariexam l Computers & Technology > Certification Tests l December 07, 2012 lViews: 632

By some estimates there are 1800 to 3000 Russian Spies in the US today, but if you asked the average citizen about this, they wouldn't have a clue. Now don't get me wrong there are plenty of spies

By: Lance Winslowl Computers & Technology > Spyware and Virusesl April 25, 2012 lViews: 215

This article will discuss the negative impact of keyloggers. While there are many positive uses of this software, I will focus on the negative side, since I am a security consultant.

By: Terry L Fenwickl Computers & Technology > Spyware and Virusesl April 22, 2012 lViews: 231

Tablet security has become a widely acquired solution to ensuring total protection of personal and business assets. The continuing diverse usage of mobile computing has brought about numerous

By: Cody Faldynl Computers & Technology > Spyware and Virusesl April 20, 2012 lViews: 205

The recent Apple malware attack on numerous Mac OS X systems has hypothetically become known as the "attack heard around the IT world." Although many IT specialists and experts around the world are

By: Cody Faldynl Computers & Technology > Spyware and Virusesl April 20, 2012 lViews: 248

The full name is Sophos Anti-Virus For Mac Home Edition and this is an antivirus utility from Sophos who also supplies business strength solutions and represents that they are including the same

By: Daniel Dreifusl Computers & Technology > Spyware and Virusesl April 20, 2012 lViews: 229

Has your computer developed a mind of its own? Is your PC sluggish? Think your computer might be infected with spyware?

By: Christopher Heckerl Computers & Technology > Spyware and Virusesl April 18, 2012 lViews: 214