【文章內(nèi)容簡介】
ta leakage, even the whole puter system collapse. Troy horse and virus difference is that it can not be transmitted, and to rely on host to other false appearance, posing as a normal procedure, such as Bo, Happy99, sub7, network, such as the glacier is a typical Troy trojan. This chapter discusses the classification, characteristics, function of Trojan horse, working principle and means of attack.Trojan 39。s full name is Troy, is a new type of puter network virus program. In the RFC1244Security Handbook gives: Troy horse is such a procedure, it provides some useful, or just interesting function. But usually do some users do not want things, such as you do not know the case file copy or steal your password. It utilizes the self implant function, depend on other propagation ability of virus, either by invasion after implantation of a variety of ways, in the target machine, in which a variety of collecting sensitive information, and through the network to municate with the outside world, to collect all kinds of sensitive info