1. Attention: We have put together a thread with tips and a tutorial video to help with using the new software. Please take a moment to check out the thread here: Trapshooters.com Tutorial & Help Video.
    Dismiss Notice


Discussion in 'Off Topic Threads' started by bigdogtx, Aug 7, 2009.

Thread Status:
Not open for further replies.
  1. bigdogtx

    bigdogtx Well-Known Member

    Aug 5, 2006
    Friend of mine just called and his email address book had sent out an email with an attachment of "Photos 27/07", He had received it from someone he knew and inadverntely opened it.

    If you get it, delete immediately. My anti-virus caught it. It is a "trojan", whatever that is.
  2. theodorescolt45

    theodorescolt45 TS Member

    Oct 12, 2007
    Purpose of Trojan horses

    Trojan horses are designed to allow a hacker remote access to a target computer system. Once a Trojan horse has been installed on a target computer system it is possible for a hacker to access it remotely and perform operations. The type of operations that a hacker can perform are limited by user privileges on the target computer system and the design of the Trojan horse itself.

    Operations which could be performed by a hacker on a target computer system include:

    * Use of the machine as part of a Botnet (e.g. to perform Distributed Denial-of-service (DDoS) attacks)
    * Data Theft (e.g. passwords, security codes, credit card information)
    * Installation of software (including other malware)
    * Downloading of files
    * Uploading of files
    * Deletion of files
    * Modification of files
    * Keystroke logging
    * Viewing the user's screen
Thread Status:
Not open for further replies.