RE: Vegas Tech unsafe downloads
Cat Dancer wrote: Yeah i get it its got malware and malware are basicaly trojans but that doesnt automaticaly make a virus - now does it?
AND THE AWNSER ISSSSSSSSSSSSSSSSSSTrojan horses are designed to allow a <a href="https://www.nodepositforum.com/wiki/Hacker_(computer_security)" title="Hacker (computer security)">hacker </a> remote access to a target computer system. Once a Trojan horse has been installed on a target computer system, it is possible for a hacker to access it remotely and perform various operations. The operations that a hacker can perform are limited by user privileges on the target computer system and the design of the Trojan horse.Operations that could be performed by a hacker on a target computer system include:Use of the machine as part of a <a href="https://www.nodepositforum.com/wiki/Botnet" title="Botnet">botnet </a> (i.e. to perform <a href="https://www.nodepositforum.com/wiki/Spam_(electronic)" title="Spam (electronic)">spamming </a> or to perform <a href="https://www.nodepositforum.com/wiki/Denial-of-service" title="Denial-of-service">Distributed Denial-of-service </a> (DDoS) attacks)<a href="https://www.nodepositforum.com/wiki/Data_theft" title="Data theft">Data theft </a> (e.g. passwords, credit card information, etc.)Installation of software (including other malware)<a href="https://www.nodepositforum.com/wiki/Uploading_and_downloading" title="Uploading and downloading">Downloading or uploading </a> of filesModification or <a href="https://www.nodepositforum.com/wiki/File_deletion" title="File deletion">deletion of files </a><a href="https://www.nodepositforum.com/wiki/Keystroke_logging" title="Keystroke logging">Keystroke logging </a><a href="https://www.nodepositforum.com/wiki/Screen_scrape" title="Screen scrape">Viewing the user's screen </a>Wasting computer storage spaceCrashing the computerTrojan horses require interaction with a <a href="https://www.nodepositforum.com/wiki/Hacker_(computing)" title="Hacker (computing)">hacker </a> to fulfill their purpose, though the hacker need not be the individual responsible for distributing the Trojan horse. In fact, it is possible for hackers to scan computers on a network using a <a href="https://www.nodepositforum.com/wiki/Port_scanner" title="Port scanner">port scanner </a> in the hope of finding one with a Trojan horse installed, which the hacker can then use to control the target computer.<sup class="reference">
[ 1] </sup>A trojan differs from the <a href="https://www.nodepositforum.com/wiki/Computer_virus" title="Computer virus">virus </a> in that only a file specifically designed to carry it can do so