what is a trojan (on your computer)?
Feb 17, · No, brides these days typically already have a drawer full of bigger & better toys than Trojan's vibrations BS. Give the wimpy Trojan toy to the bride's grandmother but get someone else to explain its purpose to her unless you really want to have a conversation like that with an 80+ lady who probably can't hear very well and has never vibrated anything in her life. Aug 18, · A trojan Horse is a Computer program that Shows Itself as a helpful soft ware but, is a malicious one, Hence the name, ALSO, A Trojan Horse portrays itself as something other than what it is at the point of execution. While it may advertise its activity after launching, this information is not apparent to the user beforehand.
There will be no changes to other Yahoo properties or services, or your Yahoo account. You can find more information about the Yahoo Answers shutdown and how to download your data on this help page. I was downloading music files, and my antivirus popped up telling me it had found and deleted a trojan. If you don't want to read all that it's just a piece of malware that can be disguised as something else. For instance, you download a picture, the icon looks like a picture, you open the picture and you see a pretty face or whatever, you close it and think all is fine.
Next thing you know your computer is shutting off randomly or what causes dogs to get uti not. It can be powerful enough to give the 'master' total control over it's new 'slave' computer The term is derived from the classical myth of the Trojan Horse. They may look useful or interesting or at the very least harmless to an unsuspecting user, but are actually harmful when executed.
Often the term is shortened to simply trojan, even though this turns the adjective into a noun, reversing the myth Greeks, not Trojans, were gaining malicious access. There are two common types of Trojan horses. One, is otherwise useful software that has been corrupted by a cracker inserting malicious code that executes while the program is used. Examples include various implementations of weather alerting programs, computer clock setting software, and peer to peer file sharing utilities.
The other type is a standalone program that masquerades as something else, like a game or image file, in order to trick the user into some misdirected complicity that is needed to carry out the program's objectives.
Trojan horse programs cannot operate autonomously, in contrast to some other types of malware, like viruses or worms. Just as the Greeks needed the Trojans to bring the horse inside for their plan to work, Trojan horse programs depend on actions by the intended victims. Therefore their virulence is of a different nature, depending on successful implementation of social engineering concepts rather than flaws in a computer what is a myoma in the uterus security design or configuration.
A Trojan is a programming code written by whats in a cheeky vimto corrupt coder, with the intention of gaining control of your system. It could be used to lanch a hack attack on some pc or what shall i render to my god network from your pc, with the intention of keeping out in what is trojan vibrations yahoo answers clear.
Virus causes physically damage to the files on the drive but a Trojan's do not cause any such harm. Almost always viruses and trojans come attached with files download from P2P. Symantec Anti-Virus though extremely good is not the best at detecting all trojan. And trojan's that have been not publicised are not detected by any Anti-virus, Anti-Spyware, Anti-Trojan software's.
A Trojan Horse portrays itself as something other than what it is at the point of execution. While it may advertise its activity after launching, this information is not apparent how to setup samsung soundbar to tv the user beforehand. A Trojan Horse neither replicates nor copies itself, but causes damage or compromises the security of the computer. A Trojan Horse must be sent by someone or carried by another program and may arrive in the form of a joke program or software of some sort.
The malicious functionality of a Trojan Horse may be anything undesirable for a computer user, including data destruction or compromising a system by providing a means for another computer to gain access, thus bypassing normal access. Trojan is a form of virus that harms even the user YOU. This virus could be transfered to your body if you are in contact with ur pc even for just some minutes. The symtpms include headache, vomitting and emmiting some blood when urination.
The worst is that it could be transmitted into others and would cause psychological problems and would lead to death. If you have theses symtoms, you better consult a doctor Some of them recommend to take upsome antivirus pills In the context of computer software, a Trojan horse is a malicious program that is disguised as or embedded within legitimate software.
A Trojan horse program has a useful and desired function, or at least it has the appearance of having how to decorate a fireplace wall. Trojans use false and fake names to trick users into dismissing the processes. These strategies are often collectively termed social engineering. In most cases the program performs other, undesired functions, but not always. The useful, or seemingly useful, functions serve as camouflage for these undesired functions.
A trojan is designed to operate with functions unknown to the victim. The kind of undesired functions are not part of the definition of a Trojan Horse; they can be of any kind, but typically they have malicious intent. In practice, Trojan Horses often contain spying functions such as a packet sniffer or backdoor functions that allow a computer to be remotely controlled from the network without the owner's knowledge, creating a "zombie computer".
Because Trojan horses often have these harmful behaviors, there often arises the misunderstanding that such functions define a Trojan Horse. The basic difference from computer viruses is that a Trojan horse is technically a normal computer program and does not possess the means to spread itself. The earliest known Trojan horses were not designed to spread themselves.
They relied on fooling people to allow the program to perform actions that they would otherwise not have voluntarily performed.
Trojans implementing backdoors typically setup a hidden server, from which a hacker with a client can then log on to. They have become polymorphic, process injecting, prevention disabling, easy to use without authorization, and therefore are abusive. Trojans of recent times also come as computer worm payloads. Trojan is a virus which comes in ur computer like trojan horse. You need to update ur antivirus and then full scan ur computer. A destructive program that masquerades as a benign application.
Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One what is trojan vibrations yahoo answers the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer. I am no computer guru, but here is what i think. Trojans are like a virus hidden in other files that are set to "attack" how to find symbols in word computer at a later date.
Trending News. Black man shot and killed by deputy in North Carolina. Remains found in search for missing Amish teen.
Analyst: 'Jig is up on Netflix' as subscriber growth slows. Recently retired Pats star lands TV gig. Pesky turtle messes with lions — and gets away with it. John Travolta talks 'healing' after Kelly Preston's death. Wizards rookie suffers sickening in-game injury. Answer Save. Favorite Answer. Heh, can we copy paste more? Neeku Lv 5. It's a kind of virus that is hidden in a normal looking file. Show more answers 2. Still have questions? Get your answers by asking now.
Jun 23, · A Trojan horse, or Trojan, is a destructive program that masquerades as a benign application. The software initially appears to perform a desirable function for the user prior to installation and/or execution, but (perhaps in addition to the expected function) steals information or harms the usloveescort.com viruses or worms, Trojan horses do not replicate themselves, but they can be just as. Mar 12, · The question about "Trojan" has been answered above and is trivial. A malware can compromise your system by executing on it. This is archieved by tricking the user into executing a binary ("exe"), executing scripts or doing something to get an exploit triggered or . Nov 09, · a TROJAN however is software that when installed on your computer will 99% of the time allow a certain person to access your computer through a backdoor without your knowledge. the level of this access varies, from simply logging everything your type to being able to watch your screen in real-time just as if they were watching over your shoulder.
There will be no changes to other Yahoo properties or services, or your Yahoo account. You can find more information about the Yahoo Answers shutdown and how to download your data on this help page. Is it possible for my partner t spy on me from his house to mine via computer The other thing is is that when my bf told me he was spying on me When he told me he had been spying on me my so called friend cara was on msn aswell.
We were speaking to the same people, and she was speaking to my boyfriend. Yet the other when i left my room And he wants a threesome with her.. EDIT: why is this even a computer question, from your additional details you're just saying your boyfriend wants to have a threesome with your friend, and that he's admitted he's spying on you etc etc - whether you reformat your computer or not it will make no difference to the problems in your life even if he never messes with your computer again.
The term trojan is an allusion to the trojan war. The greeks created something enticing a huge horse that the Trojans brought in and thus bypassing their security. In computers, it refers to a program that looks like something you want a word processor, game etc that also contains something to be a problem.
So for you to deal with a trojan horse, you would have had to have run something that your partner wrote. To be honest, it's very unlikely that a trojan horse is your issue, but accessing any given computer system isn't very hard. If you're worried about it, change your passwords and install a decent anti virus like Sav A Trojan is a program embedded in another program like the warriors in the Trojan horse. A key logger could keep track of your keystrokes on a computer, but nothing will allow your computer to spy on you when you are not using the computer.
In a computer context a Trojan is a program that masquerades as something else - as in the Trojan Horse. So a program called funny. You don't need to know about Trojans. You need to know about removing your head from your backside and getting rid of that lying, controling and dispictable excuse for a boyfriend. Update: should i reformatt my comp? But he keeps telling me he just wants to use her PLease help me im going insane i love my bf but i feel threatned by cara when she is near my bf. Answer Save.
Cirric Lv 7. Mark T Lv 6. Still have questions? Get answers by asking now.