Trojan Horses Types of Hacking Attack

Trojan Horses

In this context, a Trojan horse could be defined as an application that appears to be benign, but instead performs some type of malicious activity. A Trojan can be disguised as a game, an e-mail attachment, or even a Web page. As soon as the victim runs or opens the camouflaged application, the Trojan installs itself on the hard drive and then runs each time Windows is started.

No comments:

Post a Comment

How to Bypass windows password easily

Requirement to perform this activity 1.        Pen drive / CD/Floppy 2.        Kon boot software  ( https://drive.google.com/file/d/...