Difference between revisions of "Trojan horse"

From Clinfowiki
Jump to: navigation, search
Line 1: Line 1:
A '''Trojan Horse''' is a destructive program that masquerades itself as a benign application. Trojan horses do not replicate themselves but provide a backdoor for hidden, unauthorized access to the user's computer system. They can, for example, be used to steal files that contain sensitive information, or log the user's keystrokes to read out passwords.
+
A '''trojan Horse''' is a destructive program that masquerades itself as a benign application. Trojan horses do not replicate themselves but provide a backdoor for hidden, [[authorization|unauthorized]] [[access control|access]] to the user's computer system. They can, for example, be used to steal files that contain sensitive information, or log the user's keystrokes to read out passwords.

Revision as of 19:20, 19 October 2011

A trojan Horse is a destructive program that masquerades itself as a benign application. Trojan horses do not replicate themselves but provide a backdoor for hidden, unauthorized access to the user's computer system. They can, for example, be used to steal files that contain sensitive information, or log the user's keystrokes to read out passwords.