Jump to content
Posted 11 January 2007 - 11:46 PM
Posted 12 January 2007 - 01:29 AM
Trojan horses slip into an individual's system and run without the user's knowledge. They can have many functions. For example, some use a computer's modem to dial long-distance, generating huge phone bills for the computer owner. Unlike viruses and worms, Trojan horses do not make copies of themselves.
Like human viruses, the computer varieties contain harmful code and spread easily to infect multiple hosts. Viruses are notorious for corrupting hardware, software, and personal files. Viruses cannot spread on their own, requiring users to share infected files through e-mail attachments, flash drives, disks, P2P, Web sites, or any other file-transferring mechanisms.
0 members, 0 guests, 0 anonymous users