Back orifice, Rootkit and Beast Trojan are some of the common Trojan horses. Virus replicates itself. Trojan horse does not replicate itself. Recommended Articles. Article Contributed By :. Easy Normal Medium Hard Expert. Writing code in comment? Please use ide. Load Comments. What's New. Most popular in Computer Networks. Most visited in Difference Between. We use cookies to ensure you have the best browsing experience on our website. Network worm programs utilize network connections to spread from system to system, in the following case the network vehicles could be electronic mail facility, remote execution capability and remote login capability to drive the replication.
A trojan horse is a hidden piece of code which when executed, performs some unwanted or harmful function similar to virus. These are used to fulfil a function directly that an unauthorised user could not achieve.
For example, the trojan horse could hide its code in a login form by attaching to it. When a user inserts its details trojan send this information to the attacker without the knowledge of the user. Then the attacker can use the user details to gain access to the system. Another motive of trojan horse can be data destruction.
The program appears to be executing a useful function but it may be silently executing destructive functions. Worms are standalone software that does not need any host for its execution. On the contrary, virus and trojan horse do need a host for their execution. Trojan horse creates a backdoor for the information theft. Your email address will not be published. Key Differences Between Virus, Worm and Trojan Horse The execution and spreading of a virus rely on the transfer of the infected files, whereas worms replicate without requiring any human action and use a network to embed itself in other devices.
On the other hand, trojan horse acts as a utility software and gets executed. Viruses and worms can replicate whereas a trojan horse cannot be replicated. A virus cannot be controlled remotely. As against, worm and a trojan horse can be controlled remotely. In more recent worm attacks such as the much-talked-about.
Blaster Worm. A Trojan horse is not a virus. It is a destructive program that looks as a genuine application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive.
A typical website even the simplest blog may have thousands of potential vulnerabilities. Continue Reading. Before you download anything from the internet, be sure about it first. Due to increasing popularity of Linux as Desktop using Gnome Environment, the malware authors are becoming more interested in Linux.
Security Topics. We have updated our Privacy Policy. Enterprise PKI Platform Secure yourself against unauthorized access, email compromise, and document tampering with our enterprise tested, cloud-based PKI. CertCentral Certificate Manager Discover and manage every certificate in your ecosystem—all on one pane of glass.
Go Beyond Encryption Protect your sites with end-to-end automation solutions. If you have certificates issued before December 1, , you will need to take action. More Information. Expired Certificate?
0コメント