fahimabid
asked on
what is trojan horse and key logger ?
Any one tell me
what is trojan horse and key logger ?
what is trojan horse and key logger ?
fahimabid,
More Info
What is a Trojan Program
Trojans or often called backdoors are programs which will most be sent via email, instant-messengers or file sharing-tools (especially Kazak. If you run a Trojan file it will install itself on your computer to get run every time you boot up your machine. Trojans opens a port (channel) on your system, which can be used by an attacker to connect to your computer. Trojans can enable almost everything for an attacker to do harmful things like viewing/modifying/deleting data, watching you when you are working or surfing the web, etc. Depending on the Trojan there can be thousands of functions built in which can be remotely used by any attacker to spy you.
http://www.anti-trojan.net/en/
Trojan Removal Tools
**Freeware***
McAfee Avert http://vil.nai.com/vil/averttools.asp
Panda Utilities http://www.pandasecurity.com/disinfectionutilities.htm
Symantec Tools http://www.symantec.com/avcenter/tools.list.html
SoftWin http://www.bitdefender.com/html/free_tools.php
***Not Free***
Anti Trojan http://www.anti-trojan.net/en/ (14 Day Trial)
Trojan Defence Suite http://www.diamondcs.com.au/?hop=fwguide.diamondcs
More Info
What is a Trojan Program
Trojans or often called backdoors are programs which will most be sent via email, instant-messengers or file sharing-tools (especially Kazak. If you run a Trojan file it will install itself on your computer to get run every time you boot up your machine. Trojans opens a port (channel) on your system, which can be used by an attacker to connect to your computer. Trojans can enable almost everything for an attacker to do harmful things like viewing/modifying/deleting
http://www.anti-trojan.net/en/
Trojan Removal Tools
**Freeware***
McAfee Avert http://vil.nai.com/vil/averttools.asp
Panda Utilities http://www.pandasecurity.com/disinfectionutilities.htm
Symantec Tools http://www.symantec.com/avcenter/tools.list.html
SoftWin http://www.bitdefender.com/html/free_tools.php
***Not Free***
Anti Trojan http://www.anti-trojan.net/en/ (14 Day Trial)
Trojan Defence Suite http://www.diamondcs.com.au/?hop=fwguide.diamondcs
ASKER CERTIFIED SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
ASKER
pete long i down load keylogger and it work wonderful but i want to know if i want to see other pc's how i use it. i means if i want to see my friends pc's from my computer what method i use. and if we have our pc's on network how it works. please reply
You are sailing very close to the wind as far as the EE rules go. I cannot answer your question however I have provided a lot of links above should you have any further queries :)
PeteL
PeteL
ASKER
pete long i promise you i will use it for better purpose not in a bad purpose i really need it if this is confedential please tell me on my add fahimabid@yahoo.com
Hello, You can also run adware. It's a program that scans you computer for spyware including trojans and keyloggers running in the background. go to www.lavasoft.com and download it. It's free and it works very well.
Well Youve convinced me! but ill meet you half way , Ill tell you how to do it and you can find the bits of software you need to make it work hows that?
First you have to get the software onto the PC if you have access just install it, if you dont you need to use some software to either remote execute it on a target host PC OR convert it to a service and start it on the target host PC
Most loggers will write to a text file you can either share the file so you can connect and read it over the network or if you really want to be cool write a batch file to send it to you every few hours.
PeteL
First you have to get the software onto the PC if you have access just install it, if you dont you need to use some software to either remote execute it on a target host PC OR convert it to a service and start it on the target host PC
Most loggers will write to a text file you can either share the file so you can connect and read it over the network or if you really want to be cool write a batch file to send it to you every few hours.
PeteL
A Trojan horse is a peice of malicious code that enters your computer looking like something innocent, once it is inside it will execute itself, with the sole purpose of a. delivering a payload (erasing files etc) or b. replicating itself (Sends itself to your friends)
K Key logger runs in the background and keep a record of what keys have been pressed on the keyboard, they are primarily used to capture peoples passwords without their knowlwdge
PeteL