Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Trojan Horses

No description
by

Darius Tucker

on 18 September 2014

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Trojan Horses

Trojan Horses
By: Trey and Darius T.
What is Trojan Horse
One of many kinds of malware that is stored on your computer after a good virus hack. Trojan Horse is considered to be classified as sneaky because it looks like that they can’t do any harm and gets you downloading them on your computer. Commonly used for criminals for hacking your bank account and personal information. Anti-virus software and anti-malware defend your computer by fighting of the Trojans when they detect that they are really truly malware. Don't always count on the software by itself. Only download and install software only if you know what it is and where its from ("Trojan Horse or Trojan: It's all not a myth").

Harm
One of many kinds of malware that is stored on your computer after a good virus hack. This type is considered to be classified as sneaky because it looks like that they can’t do any harm and gets you downloading them on your computer. Commonly used for criminals for hacking your bank account and personal information. Anti-virus software and anti-malware defend your computer by fighting of the Trojans when they detect that they are really truly malware. Don't always count on the software by itself. Only download and install software only if you know what it is and where its from ("Trojan Horse or Trojan: It's all not a myth").

How it Works
Usually works with a server and s client. The client usually is disguised as a significant software and is placed in person to person sharing networks or not professional download websites . When successful , THE hacker has high power on your computer based on the hackers purpose ("Viruses, Worms and Trojan Horses").

Why Would Someone do this?
Usually works with a server and s client. The client usually is disguised as a significant software and is placed in person to person sharing networks or not professional download websites . When successful , THE hacker has high power on your computer based on the hackers purpose (“Trojan horse computing”).

How to Prevent this from Happening to me
Trojan Horse isn’t unbeatable there are ways to prevent it and below I will describe the different tactics it takes to overcome it ("Defending against Malware and Trojan Horse Threats").


1.) Protect your computer with strong security software the best one to use is McAfee Internet Security.
2.) Use a security-conscious ISP this implements strong anti-spam and anti-phishing procedures.
3.) Enable automatic updates from your computer due to that a Trojan horse can easily sneak in.
4.) Use extreme caution when opening attached emails as the same as the updates you can easily get a Trojan horse if it is using the attachment as a backdoor to get into your computer and hack.
5.) Be careful when engaging into (P2P) file sharing the Trojans sit into the file waiting to be downloaded and then once downloaded can make themselves at home into your computer.
6.) Download the latest version of your browser doing this can eliminate phising and trojans
7.) Use Security







THE NUMBER ONE WAY TO STOP ANYTHING INCLUDING HACKERS IS TO CALL THE GREAT SUPERMAN!!!!!!!! IF YOU DONT KNOW THE NUMBER ASK TERRIO HE ALWAYS KNOWS.
Mini-Quiz

1.) Be aware when engaging in (P3P)
T/F

2.) Can Trojan Horse can be beat?

3.) Who is the one man who can defeat
anything including trojan horse?
Works Cited
"Trojan horse computing." Wikipedia . Wikipedia . Web. 7 Apr 2014. <http://en.wikipedia.org/wiki/Trojan_horse_(computing)>.
"Defending against Malware and Trojan Horse Threats."McAfee. McAfee. Web. 7 Apr 2014. <http://home.mcafee.com/advicecenter/?id=ad_vp_damatht&ctst=1>.
"Trojan Horse Threats ." AVG Threat Labs . N.p.. Web. 7 Apr 2014. <http://www.avgthreatlabs.com/virus-and-malware-information/content/trojan-horse/>.
"Trojan Horse or Trojan: It’s Not All a Myth."antivirus.com. N.p.. Web. 7 Apr 2014. <http://www.antivirus.com/security-software/definition/trojan-horse/>.
"Viruses, Worms and Trojan Horses." Capital University Ask. Think. Lead. N.p.. Web. 7 Apr 2014. <http://www.capital.edu/viruses/>.
Full transcript