{"id":9917,"date":"2016-03-03T14:40:36","date_gmt":"2016-03-03T12:40:36","guid":{"rendered":"http:\/\/blogs.sun.ac.za\/it\/?p=9917"},"modified":"2016-03-16T13:03:11","modified_gmt":"2016-03-16T11:03:11","slug":"trojan-horses-at-the-back-door","status":"publish","type":"post","link":"https:\/\/blogs.sun.ac.za\/it\/2016\/03\/trojan-horses-at-the-back-door\/","title":{"rendered":"[:en]Trojans still dangerous in modern times[:af]Trojane ook in moderne tye gevaarlik[:]"},"content":{"rendered":"<p>[:en]<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/blogs.sun.ac.za\/it\/files\/2016\/02\/horse-220321_960_720.jpg\" alt=\"horse-220321_960_720\" width=\"150\" height=\"230\" align=\"right\" \/>Trojans are malicious programmes pretending to be legitimate software, but they actually carry out hidden, harmful functions.<\/p>\n<p>It\u00a0pretends to do one thing, but actually does something different, without your knowledge. Popular examples are video codecs that some sites require to view online videos.<\/p>\n<p>When a Trojan codec is installed, it may also install spyware or other malicious software. Another example is a malicious link that says \u201cCool Game.\u201d When you download and install the game program, it turns out not to be a game, but a harmful Trojan that compromises your computer or erases the data on your hard drive.<\/p>\n<p>Trojans are often distributed with pirated software applications and keygens that create illegal license codes for downloadable software. (See Backdoor Trojan)<\/p>\n<p>A backdoor Trojan allows someone to take control of a user\u2019s computer without their permission.<\/p>\n<p>It\u00a0may pose as legitimate software to fool users into running it. Alternatively\u2014as is increasingly common\u2014users may unknowingly allow Trojans onto their computer by following a link in spam email or visiting a malicious webpage.<\/p>\n<p>Once the Trojan runs, it adds itself to the computer\u2019s startup routine. It can then monitor the computer until the user is connected to the Internet. When the computer goes online, the person who sent the Trojan can perform many actions\u2014for example, run programs on the infected computer, access personal files, modify and upload files, track the user\u2019s keystrokes, or send out spam email.<\/p>\n<p>Well-known backdoor Trojans include<em> Netbus, OptixPro, Subseven, BackOrifice<\/em> and, more recently, <em>Zbot<\/em> or <em>ZeuS.<\/em><\/p>\n<p>To avoid backdoor Trojans, you should keep your computers up to date with the latest patches (to close down vulnerabilities in the operating system), and run anti-spam and antivirus software.\u00a0<\/p>\n<p><em>Take note that information below is an extract from the <a href=\"https:\/\/www.sophos.com\/en-us\/medialibrary\/PDFs\/other\/sophosthreatsaurusaz.pdf?la=en\" target=\"_blank\">Sophos Threatsaurus,<\/a> compiled by\u00a0Sophos, a security software and hardware company.<\/em><\/p>\n<p>[:af]<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/blogs.sun.ac.za\/it\/files\/2016\/02\/horse-220321_960_720.jpg\" alt=\"horse-220321_960_720\" width=\"150\" height=\"230\" align=\"right\" \/>Trojane is vyandige\u00a0programme wat voorgee dat hulle wettig is, maar eintlik voer hulle skelm skadelike aksies uit.<\/p>\n<p>Dit veins een handeling, maar doen werklik iets heeltemal anders, sonder jou medewete. Gewilde voorbeelde is die video-kodek\u00a0<em>(codec)<\/em>\u00a0vereis deur sommige webwerwe om videos aanlyn te kyk.\u00a0<\/p>\n<p>Wanneer `n Trojaanse kodek installeer word, kan dit ook loerprogramme (<em>spyware<\/em>) of ander vyandige\u00a0sagteware installeer. Nog `n voorbeeld is `n kwaadwillige skakel wat s\u00ea &#8220;Cool Game&#8221;. Wanneer jy die &#8220;speletjie&#8221; aflaai en installeer, is dit nie `n speletjie nie, maar `n skadelike Trojaanse virus wat jou rekenaar onbeskermd laat of alle data op jou hardeskyf uitvee.<\/p>\n<p>Trojaanse virusse word dikwels versprei met behulp van roofsagteware en programme wat onwettige lisensie\u00ebringskodes genereer vir aflaaibare sagteware.\u00a0<\/p>\n<p>`n Trojaanse agterdeur-virus laat iemand toe om `n gebruiker se rekenaar oor te neem sonder sy toestemming.\u00a0<\/p>\n<p>Weereens kan die sagteware hom voordoen as wettig en derhalwe\u00a0gebruikers mislei om dit te inisieer. Dis ook deesdae algemeen dat gebruikers onwetend Trojaanse virusse op hulle rekenaars laat kom deur op skakels te kliek in gemorspos of kwaadwillige webwerwe te besoek.\u00a0<\/p>\n<p>Sodra die Trojaanse virus aktiveer is, voeg dit homself toe in die rekenaar se aanvangsroetine (<em>startup<\/em>) Dit monitor dan die rekenaar totdat die gebruiker aan die internet verbind.\u00a0Wanneer die rekenaar aanlyn gaan, kan die persoon wat die Trojaanse virus gestuur het, verskeie\u00a0aksies uitvoer. So kan hy programme loods\u00a0op die aangetaste\u00a0rekenaar, toegang kry tot persoonlike le\u00ears, le\u00ears oplaai en wysig, gebruikers se sleutelslae naspeur of selfs gemorspos namens die gebruiker uitstuur.<\/p>\n<p>Bekende Trojaanse agterdeur-virusse sluit\u00a0Netbus, <em>OptixPro, Subseven, BackOrifice,\u00a0Zbot <\/em>en<em>\u00a0ZeuS <\/em>in.<\/p>\n<p>Om hierdie risikos te vermy, sorg dat jou rekenaar altyd op datum is met die nuutste sagteware-opdaterings (om swakplekke in die bedryfstelsel te voorkom) en voer gereeld anti-gemorspos en -virus sagteware uit.\u00a0<\/p>\n<p><em>Neem kennis dat bostaande inligting \u0149 uittreksel is uit die\u00a0<a href=\"https:\/\/www.sophos.com\/en-us\/medialibrary\/PDFs\/other\/sophosthreatsaurusaz.pdf?la=en\" target=\"_blank\">Sophos Threatsaurus,<\/a>\u00a0saamgestel deur Sophos, \u0149 sekuriteit-sagteware en -hardeware maatskappy.<\/em><\/p>\n<p>[:]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[:en] Trojans are malicious programmes pretending to be legitimate software, but they actually carry out hidden, harmful functions. It\u00a0pretends to do one thing, but actually does something different, without your knowledge. Popular examples are video codecs that some sites require to view online videos. When a Trojan codec is installed, it may also install spyware [&hellip;]<\/p>\n","protected":false},"author":259,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29187],"tags":[29175],"class_list":["post-9917","post","type-post","status-publish","format-standard","hentry","category-security-2","tag-trojan"],"publishpress_future_action":{"enabled":false,"date":"2026-05-08 07:09:53","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/9917","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/users\/259"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/comments?post=9917"}],"version-history":[{"count":23,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/9917\/revisions"}],"predecessor-version":[{"id":10061,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/9917\/revisions\/10061"}],"wp:attachment":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/media?parent=9917"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/categories?post=9917"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/tags?post=9917"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}