%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R >> /XObject << /I1 13 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text /ImageC ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20240512044040+00'00') /ModDate (D:20240512044040+00'00') /Title (IT-artikels) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 11 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 4144 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 204.838 521.469 541.896 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 205.213 520.719 541.146 re S 0.773 0.773 0.773 rg 61.016 617.359 m 550.984 617.359 l 550.984 618.109 l 61.016 618.109 l f 1.000 1.000 1.000 rg BT 278.868 698.693 Td /F1 10.5 Tf [(POST LIST)] TJ ET 0.200 0.200 0.200 rg BT 212.789 670.111 Td /F1 14.4 Tf [(INFORMASIETEGNOLOGIE)] TJ ET BT 221.824 643.466 Td /F1 11.7 Tf [(INFORMATION TECHNOLOGY)] TJ ET BT 61.016 583.841 Td /F1 14.4 Tf [(TROJANS STILL DANGEROUS IN MODERN TIMES)] TJ ET 0.400 0.400 0.400 rg BT 61.016 564.033 Td /F3 9.0 Tf [(Trojans are malicious programmes pretending to be legitimate software, but they actually )] TJ ET BT 61.016 553.044 Td /F3 9.0 Tf [(carry out hidden, harmful functions.)] TJ ET BT 61.016 533.055 Td /F3 9.0 Tf [(Itpretends to do one thing, but actually does something different, without your knowledge. )] TJ ET BT 61.016 522.066 Td /F3 9.0 Tf [(Popular examples are video codecs that some sites require to view online videos.)] TJ ET BT 61.016 502.077 Td /F3 9.0 Tf [(When a Trojan codec is installed, it may also install spyware or other malicious software. )] TJ ET BT 61.016 491.088 Td /F3 9.0 Tf [(Another example is a malicious link that says Cool Game. When you download and install )] TJ ET BT 61.016 480.099 Td /F3 9.0 Tf [(the game program, it turns out not to be a game, but a harmful Trojan that compromises your )] TJ ET BT 61.016 469.110 Td /F3 9.0 Tf [(computer or erases the data on your hard drive.)] TJ ET BT 61.016 449.121 Td /F3 9.0 Tf [(Trojans are often distributed with pirated software applications and keygens that create illegal )] TJ ET BT 61.016 438.132 Td /F3 9.0 Tf [(license codes for downloadable software. \(See Backdoor Trojan\))] TJ ET BT 61.016 418.143 Td /F3 9.0 Tf [(A backdoor Trojan allows someone to take control of a users computer without their )] TJ ET BT 61.016 407.154 Td /F3 9.0 Tf [(permission.)] TJ ET BT 61.016 387.165 Td /F3 9.0 Tf [(Itmay pose as legitimate software to fool users into running it. Alternativelyas is increasingly commonusers may )] TJ ET BT 61.016 376.176 Td /F3 9.0 Tf [(unknowingly allow Trojans onto their computer by following a link in spam email or visiting a malicious webpage.)] TJ ET BT 61.016 356.187 Td /F3 9.0 Tf [(Once the Trojan runs, it adds itself to the computers startup routine. It can then monitor the computer until the user is )] TJ ET BT 61.016 345.198 Td /F3 9.0 Tf [(connected to the Internet. When the computer goes online, the person who sent the Trojan can perform many actionsfor )] TJ ET BT 61.016 334.209 Td /F3 9.0 Tf [(example, run programs on the infected computer, access personal files, modify and upload files, track the users )] TJ ET BT 61.016 323.220 Td /F3 9.0 Tf [(keystrokes, or send out spam email.)] TJ ET BT 61.016 303.231 Td /F3 9.0 Tf [(Well-known backdoor Trojans include)] TJ ET BT 210.560 303.231 Td /F3 9.0 Tf [( Netbus, OptixPro, Subseven, BackOrifice)] TJ ET BT 377.627 303.231 Td /F3 9.0 Tf [( and, more recently, )] TJ ET BT 459.662 303.231 Td /F3 9.0 Tf [(Zbot)] TJ ET BT 477.671 303.231 Td /F3 9.0 Tf [( or )] TJ ET BT 490.676 303.231 Td /F3 9.0 Tf [(ZeuS.)] TJ ET BT 61.016 283.242 Td /F3 9.0 Tf [(To avoid backdoor Trojans, you should keep your computers up to date with the latest patches \(to close down )] TJ ET BT 61.016 272.253 Td /F3 9.0 Tf [(vulnerabilities in the operating system\), and run anti-spam and antivirus software.)] TJ ET BT 61.016 252.264 Td /F3 9.0 Tf [(Take note that information below is an extract from the)] TJ ET 0.373 0.169 0.255 rg BT 278.114 252.264 Td /F3 9.0 Tf [(Sophos Threatsaurus,)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 278.114 251.113 m 366.656 251.113 l S 0.400 0.400 0.400 rg BT 366.656 252.264 Td /F3 9.0 Tf [( compiled bySophos, a security software and )] TJ ET BT 61.016 241.275 Td /F3 9.0 Tf [(hardware company.)] TJ ET BT 61.016 222.786 Td /F3 9.0 Tf [(Posted in:Security | Tagged:Trojan | With 0 comments)] TJ ET q 112.500 0 0 172.500 438.484 400.324 cm /I1 Do Q endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Annot /Subtype /Link /A 12 0 R /Border [0 0 0] /H /I /Rect [ 278.1137 251.4316 366.6557 260.5891 ] >> endobj 12 0 obj << /Type /Action /S /URI /URI (https://www.sophos.com/en-us/medialibrary/PDFs/other/sophosthreatsaurusaz.pdf?la=en) >> endobj 13 0 obj << /Type /XObject /Subtype /Image /Width 150 /Height 230 /ColorSpace /DeviceRGB /Filter /DCTDecode /BitsPerComponent 8 /Length 4647>> stream ExifII*Ducky<http://ns.adobe.com/xap/1.0/ Adobed         !1AQaq"2BR#brƒ$T3ScsD%u ?(8 l.oe'LWU̠tZ,.qw1Eu8&nnu #Η鬓 nIԟѸkG/7.;5ɰIaQxV⃘_]c}uie֕.d|و+W[=C^K1Ob.?}o-wzg[j/4i-Ӭ-sxsWSltˊlٕ}҈E 9Нik kһtt|9o;tƤx NSҶB=4v+7SCa~8(.ٸ./As<|}_mtRw3H4>ml5՘ 4m<9' wl-%;'M40̃3'x%p4TFʃ?mbh.|ѴzMbqg61 .i1Nxx!gyzRpg,գ-? ?јRskHG T@@A{ XԏwռhpvhXM=2=Ŕ(:=C|Qx֑h# T@@@@@@A{ۙu]eS3w5=Ѵ"#&Qx  T@@@@@@@A =C`nu`MG:Xz^-(# T@@@A@@AK&yoo%?AEM+LE10[ΧN61=mh4sYz's5RDC47CZ<8h6KǓҷ Z]WCdhANr%+9en鱼r Pw]7+7SܷIP@Knw+#sj19KyM xdx,2XQp<# {%24S5H A%5 ]c[xxm?KXnW R|Y\499kA2o8jUEo >-o:oJh ֝mõ^Z/>/KG+s\ZC ߲9MW2ij`t$%|M5 hmm;Loyh̴.Һ?mcHd!sh;Hj7|Tuә0]|G$|ǐm.̵rW!_ !:%9{6S\"8㾁y흟]1k+f ۟miـ]M18__siq^A3:3=Z={ǀAA􀀀[wn;e<ܮݖY.ۿX|P?Ɛ8X=ͶAd#h`2xA$;S@fI@:nx }~/KZn2>q[HzR#WPCqP\ bwxql`7Sr&}F3Z3z5qP*x {Om=r:h]SP$"&T{4O.Mp۫ߐd^ i卂ڞV4TO>%nX~73l"V]8=|Pk*MTAWysUg mgɐqy pX]mMLrX{D:I^Y{~xI@@A@A;d2>(5*8 >h p:Vdu6OJˋ\[=F#6)4kZ~h=ZVH-epA-9`l]HiW> startxref 10184 %%EOF Trojans still dangerous in modern times « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Trojans still dangerous in modern times

horse-220321_960_720Trojans are malicious programmes pretending to be legitimate software, but they actually carry out hidden, harmful functions.

It pretends to do one thing, but actually does something different, without your knowledge. Popular examples are video codecs that some sites require to view online videos.

When a Trojan codec is installed, it may also install spyware or other malicious software. Another example is a malicious link that says “Cool Game.” When you download and install the game program, it turns out not to be a game, but a harmful Trojan that compromises your computer or erases the data on your hard drive.

Trojans are often distributed with pirated software applications and keygens that create illegal license codes for downloadable software. (See Backdoor Trojan)

A backdoor Trojan allows someone to take control of a user’s computer without their permission.

It may pose as legitimate software to fool users into running it. Alternatively—as is increasingly common—users may unknowingly allow Trojans onto their computer by following a link in spam email or visiting a malicious webpage.

Once the Trojan runs, it adds itself to the computer’s startup routine. It can then monitor the computer until the user is connected to the Internet. When the computer goes online, the person who sent the Trojan can perform many actions—for example, run programs on the infected computer, access personal files, modify and upload files, track the user’s keystrokes, or send out spam email.

Well-known backdoor Trojans include Netbus, OptixPro, Subseven, BackOrifice and, more recently, Zbot or ZeuS.

To avoid backdoor Trojans, you should keep your computers up to date with the latest patches (to close down vulnerabilities in the operating system), and run anti-spam and antivirus software. 

Take note that information below is an extract from the Sophos Threatsaurus, compiled by Sophos, a security software and hardware company.

Tags:

Comments are closed.

 

© 2013-2024 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.