Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Just Curious


  • Please log in to reply
4 replies to this topic

#1 sharpie

sharpie

  • Members
  • 702 posts
  • OFFLINE
  •  
  • Location:Nor-Cal
  • Local time:03:39 PM

Posted 11 January 2007 - 11:46 PM

what is the difference between a trojan and a virus?
:thumbsup:
thanks

BC AdBot (Login to Remove)

 


#2 idk

idk

  • Members
  • 302 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Auckland, New Zealand
  • Local time:08:39 AM

Posted 12 January 2007 - 12:00 AM

Trojans are harder to remove than a virus.

#3 sharpie

sharpie
  • Topic Starter

  • Members
  • 702 posts
  • OFFLINE
  •  
  • Location:Nor-Cal
  • Local time:03:39 PM

Posted 12 January 2007 - 01:21 AM

but do they do the same thing?

#4 tg1911

tg1911

    Lord Spam Magnet


  • Members
  • 19,274 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:SW Louisiana
  • Local time:01:39 PM

Posted 12 January 2007 - 01:29 AM

Trojan horses
Trojan horses slip into an individual's system and run without the user's knowledge. They can have many functions. For example, some use a computer's modem to dial long-distance, generating huge phone bills for the computer owner. Unlike viruses and worms, Trojan horses do not make copies of themselves.


Virus
Like human viruses, the computer varieties contain harmful code and spread easily to infect multiple hosts. Viruses are notorious for corrupting hardware, software, and personal files. Viruses cannot spread on their own, requiring users to share infected files through e-mail attachments, flash drives, disks, P2P, Web sites, or any other file-transferring mechanisms.

http://www.download.com/Security-glossary/
MOBO: GIGABYTE GA-MA790X-UD4P, CPU: Phenom II X4 955 Deneb BE, HS/F: CoolerMaster V8, RAM: 2 x 1G Kingston HyperX DDR2 800, VGA: ECS GeForce Black GTX 560, PSU: Antec TruePower Modular 750W, Soundcard: Asus Xonar D1, Case: CoolerMaster COSMOS 1000, Storage: Internal - 2 x Seagate 250GB SATA, 2 x WD 1TB SATA; External - Seagate 500GB USB, WD 640GB eSATA, 3 x WD 1TB eSATA

Become a BleepingComputer fan: Facebook

#5 sharpie

sharpie
  • Topic Starter

  • Members
  • 702 posts
  • OFFLINE
  •  
  • Location:Nor-Cal
  • Local time:03:39 PM

Posted 12 January 2007 - 07:04 PM

ok thank you both




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users