9
Trojan Horse Virus Siti Nur Syafiqah bt. Mat Noor 4 Nilam 2009

Trojan Horse Virus

Embed Size (px)

DESCRIPTION

video nie ak publish lpas ak wat presentati0n it kat sk0la..huhuhu=P

Citation preview

Page 1: Trojan Horse Virus

Trojan Horse Virus

Siti Nur Syafiqah bt. Mat Noor

4 Nilam

2009

Page 2: Trojan Horse Virus

Presentation Objective

At the end of the presentation, you will understand What is a Trojan horse? Types of Trojan Horse? How do we avoid getting infected in the future? How do we get rid of trojans?!?

Page 3: Trojan Horse Virus

Trojan Horse

a program that

installs malicious

software while

under the guise

of doing

something else.

malicious code that is well disguised and claims

to be a useful program

or legitimate software.

pose as useful programs

but contain hidden commands.

does things to the user’s

computer that the user does

not want or intend

computer threats that perform a desirable function but in fact

performs undisclosed malicious functions

that allow unauthorized access to the host machine.

Page 4: Trojan Horse Virus

Types of Trojan HorseTypes of Trojan Horse

Trojan Horse

A useful software program that is corrupted by hacker

and cracker inserts malicious code into the program

that executes while the program is used.

Act as key loggers that send what

all you are typing to an outside system.

Page 5: Trojan Horse Virus

How do we avoid from getting infected?

NEVER download anything from people or sites which you were not 100% sure about it.

You must be sure what the file is before opening it, because many trojans will automatically try to spread themselves to friends in an email address book or on an IRC channel.

Beware of hidden file extensions! To reduce the chances of being tricked, unhide those troublesome extensions.

NEVER use features in your programs that automatically get or preview files.

Page 6: Trojan Horse Virus

How do we remove Trojans?!?

1. You can restore your computer

2. Try optimizing Internet Explorer Browser

3. Downloading anti-virus software

4. Use the following tools:

The program is called smitfraudfixhttp://siri.geekstogo.com/smitfraudfix.p...-- Just follow the instruction there

then do an Online ewido scanhttp://www.ewido.net/en/onlinescan/...Just remove all those infections

Page 7: Trojan Horse Virus

ConclusionConclusion

We need to be careful when download something. We also need an anti-virus to protect our computer from be infected by virus.

We need to be a smart user because this can help us from be tricked with nice thing but behind the scenes it infects our computer with a Trojan or Worm.

Page 8: Trojan Horse Virus

ReferencesReferences

http://antivirus.about.com/b/2006/05/31/whats-a-trojan-horse-virus.h

tm http://www.irchelp.org/irchelp/security/trojan.html http://www.secureurpc.com/secureurpc-articles/trojan-horse-comput

er-virus.php http://www.pcmantra.com/Images/spy-mid.gif http://www.securitysoftwarezone.com/modules/news/files/trojan-hor

se.gif http://www.intego.com/pix/virusMP3.gif http://www.innovonics.com/graphics/weaklink.gif http://www.msconsulting.com/images/MSS-Attack.jpg www.newscitech.com http://au.answers.yahoo.com/question/index?

qid=20070515130138AAlllwf

Page 9: Trojan Horse Virus

Group MembersGroup Members

Najihah bt IsmitNajihah bt Ismit Fatin Hazwani bt. Dul FatthahFatin Hazwani bt. Dul Fatthah Jothi Letchumy a/p P.Mahendra KumarJothi Letchumy a/p P.Mahendra Kumar Muna bt. OsmanMuna bt. Osman Eunice Quah Xuet - WyneEunice Quah Xuet - Wyne Thum Jing YeeThum Jing Yee Mah Sok WanMah Sok Wan Keethanjeli a/p KaliyapanKeethanjeli a/p Kaliyapan Elil Bharati a/p SanggaElil Bharati a/p Sangga PriyatharusiniPriyatharusini Mas Ewani bt. Mohd. YusoffMas Ewani bt. Mohd. Yusoff Anastasia bt. Mohd Shah Nizam ShermanAnastasia bt. Mohd Shah Nizam Sherman Azhani bt AziziAzhani bt Azizi