features of trojan horse
Answers
Answered by
7
MARK IT AS BRAINLIST ANSWER
As the popularization of the Internet, the viruses are widespread beyond imaging. Trojan, widely known as one of the viruses, is trying to control another computer by using powerful client-server model, which is a central computer provides information and processes to multiple end-user computers. These computers that completely are invaded by Trojan are servers, and hackers use controller to operate servers. Once controller connects with Trojan, the client will own most power of the server so that the client can issue commands in the computer, such as brows, move, copy, and delete documents.
As the popularization of the Internet, the viruses are widespread beyond imaging. Trojan, widely known as one of the viruses, is trying to control another computer by using powerful client-server model, which is a central computer provides information and processes to multiple end-user computers. These computers that completely are invaded by Trojan are servers, and hackers use controller to operate servers. Once controller connects with Trojan, the client will own most power of the server so that the client can issue commands in the computer, such as brows, move, copy, and delete documents.
Answered by
9
##HELLO#
It is a type of malicious software developed by hackers to disguise as legitimate software to gain access to target users' systems. Users are typically tricked by some attractive social media adds who then directed to malicious website thereby loading and executing Trojans on their systems. Cyber-criminals use Trojans to spy on the victim user, gain illegal access to the system to extract sensitive data.
I hope it will help you :)
It is a type of malicious software developed by hackers to disguise as legitimate software to gain access to target users' systems. Users are typically tricked by some attractive social media adds who then directed to malicious website thereby loading and executing Trojans on their systems. Cyber-criminals use Trojans to spy on the victim user, gain illegal access to the system to extract sensitive data.
I hope it will help you :)
ParamPatel:
HII
Similar questions
Chemistry,
1 year ago