دوستو ! میں دو عدد وائرس کے نام دے رہا ہوں آپ میں سے جو بھی امور وائرس کا ماہر ہو وہ ان کا شجرہ بیان کردے اور یہ بھی بتائے کہ یہ کس حد تک نقصان دہ ہیں؟
دوستو ! میں دو عدد وائرس کے نام دے رہا ہوں آپ میں سے جو بھی امور وائرس کا ماہر ہو وہ ان کا شجرہ بیان کردے اور یہ بھی بتائے کہ یہ کس حد تک نقصان دہ ہیں؟
torjan horse ek computer virus hay jo kay kay ek side pay non executeded file mein b paya jata hay jesy kay compress document wahagera
aur executable file mein b paya jata hay torjan horse usuelly ek fieanda mand computer mein zahar hota hay
torjan horse aap kay computer kay password par nazar rkhata hay aur computer par b jo kuch aap kartay hay ye aap ki key borad key par b dehaan hota hay kya aap kon c key press kartay hay
aur torjan horse aap kay system kay data aur progarme ko kharab kar deta
jo aap ki hadd mein hoo
ye aap kay alloction talble par b attack karta hay
jes say aap kay data ko naksaan hota hay
ye computer mein rehta hay aur es ko damag karta jata hay
ye dosray logon ko b ajazat deta hay kay aap es kay computer ko remotely control kar sakay
torjan kay ziary hacker humaray computer mien dahal honay mein kamyaab hotay hay
aur ye ek programe virus hota hay ye aap kay system ki security ki copy kartay hay aur kesi ko beaj deatay hay
es say aap ka computer online banking kay liay safe nahi
ye b es kay behan bahi hay
adware / spyware
MFA site not allowed, ITDunya team
hummmm nice info
next time koi doosra sawal likhoon ga
agar koi aur doost batana chahay to zaroor batain
yarr wah nice informormation hay
nice information for trojan
good
Hmm Nice info, waise to main spyware aur Torjan k bary main janta tha, likin itne detail se aap ne samjhaya to bahot maza aya is k bary main jaan kar.. apka bahot bahot shokria.
Hmmm..zikar horha hai Trojan Horse ka,
Trojan, ...Trojan word TROY say nikla hai... agar ap nay 10th class ki english book main dikha ho eik boht hi interesting story hai..jis ka subject some thing like " TROY " hi hai i guess..os main koch yon hota hai kay eik foj dosry foj pr attack kilye lakri ka gora(horse) bana detay hai..or os kay zariya opposite foj kay qaly(Castle) main ponch jaty hai.. .. i mean to say kay .. eik target jaga pr ponchany kilye pechla darwza (Backdoor) Use karna..
.
asi tarah Computer programmers nay eik virus banaya..jis ko Trojan Horse ka name diya gaya..jo kay humary computer main Shells/Ports(Back door) open kar deta hai..jis say hacker humara computer easily access kar skta hai..
Example of a simple Trojan horse:
eik am Trojan ki example main dena chahta hon..forexample eik virus hai jis ka name hoga "Waterfall.scr" jab app is ko dekty ho to ye actually eik screen sever hai.. magar jab ap is ko open karty hO to ye app kay computer pr remote access ko allow kar deta hai..
Types of Trojan horse payloads
Trojan Horse humesha asliye hi design hotay hai kay computer kay sth koch na koch ghalat hi karay..They are broken down in classification based on how they breach systems and the damage they cause.
Nine (9) main types of Trojan horse payloads are:
* Remote Access
* Email Sending
* Data Destructive
* Downloader
* Proxy Trojan (disguising others as the infected computer)
* FTP Trojan (adding or copying data from the infected computer)
* security software disabler
* denial-of-service attack (DoS)
* URL trojan (directing the infected computer to only connect to the internet via an expensive dial-up connection)
Some examples are:
* erasing or overwriting data on a computer
* encrypting files in a cryptoviral extortion attack
* corrupting files in a subtle way
* upload and download files
* allowing remote access to the victim's computer. This is called a RAT (remote administration tool)
* spreading other malware, such as viruses: this type of Trojan horse is called a 'dropper' or 'vector'
* setting up networks of zombie computers in order to launch DDoS attacks or send spam.
* spying on the user of a computer and covertly reporting data like browsing habits to other people (see the article on spyware)
* making screenshots
* logging keystrokes to steal information such as passwords and credit card numbers
* phishing for bank or other account details, which can be used for criminal activities
* installing a backdoor on a computer system
* opening and closing CD-ROM tray
* harvesting e-mail addresses and using them for spam
* restarting the computer whenever the infected program is started
* deactivating or interfering with anti-virus and firewall programs
* deactivating or interfering with other competing forms of malware
..Omeed hai is qisam kay virus say app careful rahogay.
.
is say defiance ka tariqa main batana zaroorii samjta hon. jo kay main koch zaroori steps main explorer karonga..
1. Jab be unknown person ap ko koi link/url/website send kary to os ko click na karo.
2. kesi Unknown person say koi be file/picture/ accept na karo..Jab thak ap ko file extension ki pori information na ho..
3. Trojan Virus chand extensions main kafe zayda hotay hai..wo extension ye hai (exe,com,bat,scr), in jisy file ko download or accept karny kay bad pori tarah scan kariye
4. Online file scan karny kilye sub say best website ye hai www.virustotal.com , aslye jo be file ap download ya accept karo.os ko open karny say pehly is pr upload karky scan result diko..kay aya ye infect file to nahi hai...
5. Trojan Virus jab Run hojay..or ap sure ho kay virus to run hogaya..phir app apna computer on the spot internet say disconnect kariye, or phir os kay bad repair karny ki koshish kariye..ya jo be kar skty ho..
Thanks.
Why Read “IMPOSABLE” Just Read It " I M POSABLE"
Bookmarks