作业帮 > 英语 > 作业

跪求和木马有关的英文论文,5000单词左右!

来源:学生作业帮 编辑:作业帮 分类:英语作业 时间:2024/05/12 04:49:59
跪求和木马有关的英文论文,5000单词左右!
论文的话没有找到,不过找到了论文的资料,下面是关于特洛伊木马的资料,这些资料可能对您写论文有所帮助!
Trojan horse (computing)
In the context of computing and software, a Trojan horse, or simply trojan, is a piece of software which appears to perform a certain action but in fact performs another such as a computer virus. Contrary to popular belief, this action, usually encoded in a hidden payload, may or may not be actually malicious, but Trojan horses are notorious today for their use in the installation of backdoor programs. Simply put, a Trojan horse is not a computer virus. Unlike such malware, it does not propagate by self-replication but relies heavily on the exploitation of an end-user (see Social engineering). It is instead a categorical attribute which can encompass many different forms of codes. Therefore, a computer worm or virus may be a Trojan horse. The term is derived from the classical story of the Trojan Horse.
In the field of computer architecture, 'Trojan Horse' can also refer to security loopholes that allow kernel code to access anything for which it is not authorized.
Etymology
The word 'Trojan horse' is generally attributed to Daniel Edwards of the NSA. He is given credit for identifying the attack form in the report "Computer Security Technology Planning Study".[1] The term comes from analogy to an episode during the legendary Trojan War, as mentioned in Homer's Odyssey and Virgil's Aeneid: worn out by the long siege, the attacking Greeks built a giant wooden horse, ostensibly a peace offering, and pretended to sail away, but in fact left soldiers hidden inside the statue. After the Trojans brought the horse inside the city walls, the soldiers emerged, opened the gates to the Greek armies, and sacked the city of Troy.
A very classic example, is due to computer pioneer Ken Thompson in his 1983 ACM Turing Award lecture. Thompson noted that it is possible to add code to the UNIX "login" command that would accept either the intended encrypted password or a particular known password, allowing a back door into the system with the latter password. Furthermore, Thompson argued, the C compiler itself could be modified to automatically generate the rogue code, to make detecting the modification even harder. Because the compiler is itself a program generated from a compiler, the Trojan horse could also be automatically installed in a new compiler program, without any detectable modification to the source of the new compiler.[2]
Example
The simple example of a Trojan horse would be a program named "waterfalls.scr" where its author claims it is a free waterfall screensaver. When run, it instead unloads hidden programs, commands, scripts, or any number of commands with or without the user's knowledge or consent. Malicious Trojan Horse programs are often used to circumvent protection systems in effect creating a vulnerable system to allow unauthorized access to the user's computer. Non-malicious Trojan Horse programs are used for managing and forensics.
Types of Trojan horse payloads
Trojan horse payloads are almost always designed to do various harmful things, but can also be harmless. They are broken down in classification based on how they breach and damage systems. The six main types of Trojan horse payloads are:
Remote Access
Data Destruction
Downloader
Server Trojan(Proxy, FTP , IRC, Email, HTTP/HTTPS, etc.)
Security software disabler
Denial-of-service attack (DoS)
Some examples of damage are:
Erasing or overwriting data on a computer
Encrypting files in a cryptoviral extortion attack
Corrupting files in a subtle way
Upload and download files
Copying fake links, which lead to false websites, chats, or other account based websites, showing any local account name on the computer falsely engaging in untrue context
Allowing remote access to the victim's computer. This is called a RAT (remote access trojan)
Spreading other malware, such as viruses: this type of Trojan horse is called a 'dropper' or 'vector'
Setting up networks of zombie computers in order to launch DDoS attacks or send spam.
Spying on the user of a computer and covertly reporting data like browsing habits to other people (see the article on spyware)
Making screenshots
Logging keystrokes to steal information such as passwords and credit card numbers
Phishing for bank or other account details, which can be used for criminal activities
Installing a backdoor on a computer system
Opening and closing CD-ROM tray
Playing sounds, videos or displaying images.
Calling using the modem to expensive numbers, thus causing massive phone bills.
Harvesting e-mail addresses and using them for spam
Restarting the computer whenever the infected program is started
Deactivating or interfering with anti-virus and firewall programs
Deactivating or interfering with other competing forms of malware
Randomly shutting off the computer
Methods of deletion
Since Trojan horses have a variety of forms, there is no single method to delete them. The simplest responses involve clearing the temporary internet files on a computer, or finding the file and deleting it manually ( safe mode is recommended ). Normally, anti-virus software is able to detect and remove the trojan automatically. If the antivirus cannot find it, booting the computer from alternate media(cd) may allow an antivirus program to find a trojan and delete it. Updated anti-spyware programs are also very efficient against this threat.
Disguises
Most varieties of Trojan horses are hidden on the computer without the user's awareness. Trojan horses sometimes use the Registry, adding entries that cause programs to run every time the computer boots up. Trojan horses may also work by combining with legitimate files on the computer. When the legitimate file is opened, the Trojan horse opens as well.
List of trojan horses
AIDS
Back Orifice
Bandook
Beast Trojan
Bifrost
Downloader.Zlob
Generic8.LDI
Nuclear RAT (NR, NucRat)
Insurrection
Live Update
LeoSrv
Look2Me
Optix Pro
Pigeon AXLM
Posion Ivy
Trojan.Qoologic - Key Logger
Trojan Luder - B
Trojan horse dropper.Exebing.U
Shaft
sharK
SHeur.ZSQ
Storm Trojan
SubSeven
ProRat
Trojan.Bytesize?
Trojan.Jakposh
Trojan.wavBfly
Trojan.wavVerify
Trojan.Vundo
Obfuscated.en
Zlob trojan
Trojan Metamorf.C
Trojan virtumonde
TrojanDownloader.xs
trojans makes your PC exposed by means of remote, surreptitious access to your system without your notice
trojans are transferred to your computer through peer to peer programs (P2P) or websites without your notice so u should make a weekly scan on your system, i use NOD32 antivirus and i usually find 5 or 6 trojans on my system
one thing to do when you get a trojan warning, delete the file without quarantining it .