Pages

IP Address Tracker

IP
Arun Anoop M

Sunday, December 23, 2012

Trojan Horse Virus History.....


Trojan Horse in TROY Film
The Trojan Horse is a crafty contraption that allowed the Greeks to put an

end to the 10-year-old Trojan War. The wily Greek hero Odysseus conceived

the project and design for the Trojan Horse ; Epeus, is credited with the

actual building of the Trojan Horse.
The Greeks left a giant wooden object made to look like a horse at the Trojan 
city gates. Some of the Greeks pretended to sail away, but actually sailed 

just out of sight. The other Greeks stood waiting, inside the belly of the 

wooden beast.
When the Trojans saw the giant wooden horse and the departing Greek 
troops, they thought the wooden horse was a parting gift for the gods, so 
most of them wanted to wheel it into their city. The decision to move the 
Trojan Horse into the city was opposed by Cassandra, the prophetess whose 
fate was never to be believed, and Laocoon, who was destroyed, along with 
his two sons, by sea serpents after pleading with his fellow Trojans to leave 
the Trojan Horse outside their city walls. The Trojans took this as a sign that 
the gods were displeased with Laocoon's message. Besides, the Trojans 
preferred to believe that since the Greeks were gone, the long war was over. 
The city opened the gates, let the horse in, and celebrated riotously. When 
the Trojans passed out or fell asleep, the Greeks climbed down from the belly 
of the Trojan Horse, opened the city gates and ushered the rest of the troops 
into the city. The Greeks then sacked, destroyed, and burned Troy.

Trojan Horse Virus
  Trojan horse sitting invisibly in an infected computer and this program gives full control of that computer. 
   Trojans do not attempt to inject themselves into other files like a computer virus
   Trojan horses may steal information, or harm their host computer systems.
   Trojan horses in this way may require interaction with a hacker to fulfill their purpose, though the hacker does not have to be the individual responsible for distributing the Trojan horse. 
   It is possible for individual hackers to scan computers on a network using a port scanner in the hope of finding one with a malicious Trojan horse installed, which the hacker can then use to control the target computer.

No comments:

Post a Comment