Trojan Horse Greek Myth Or Your Personal Computer Nemesis – It Is Your Choice
In Greek Mythology, Odysseus tricked the Trojans into letting the Greek army into the impregnable gates of Troy by having his men convert one of their ships into a huge wooden horse, presenting it as a gift with all his troops inside. Shown to beautiful effect by the Brad Pitt film Troy, the tactic is unfortunately used in the computing world in exactly the same way.
Trojan Horses are programs that masquerade as something harmless. They don’t replicate themselves, they don’t destroy your data, and they don’t seem to do anything. Dont be fooled. Trojan Horses do their dirty work, like the Greeks of myth, by being the “inside man” they’ll disable your firewall protection, opening ports for botnet masters to turn your computer into a zombie, they’ll promise to remove viruses while downloading installation packages for them, or they’ll invite keystroke loggers to steal your personal information and send it out on the Internet for people who’ll use the information to do untold harm to you.
Most Trojan Horses, like phishing...