[Reproduced] difference between Trojans and viruses

[Reproduced] difference between Trojans and viruses

Source: https://www.zhihu.com/question/23207532

Tencent security answer

Author: Tencent joint lab safety

virus:

Usually we are talking about the usual virus, refers to a virus infection, compilers are inserted in a computer program or computer functions disrupting code data, can affect computer, a set of computer instructions or program code for self-replicating. It has spread, concealment, infectious, latent, excitability, performance or destructive.

General viral life cycle: development of the infectious period → → → incubation period of exacerbation → find → → digestion of extinction period. And biological viruses have many similarities, such as self-propagation, infect each other and activating regeneration and other biological characteristics of the virus and so on.


Trojan:

Trojan virus from the ancient Greek story of the Trojan War famous "Trojan Horse," named after, where self-Baidu, a very interesting. Trojan typically sent via e-mail attachments, bundled in other programs, to control another computer through a specific program (Trojan), executable programs usually have two: one is the control terminal, the control terminal being further . "Trojan horse" virus program and general different, it does not reproduce itself, it does not "deliberately" to go to infect other files, it will modify the registry, in-memory, install backdoors in the system, boot loader included with Trojan .

Trojan virus attack to run the client program in the user's machine, once the attack, the back door can be provided, the timing of transmitting the user's privacy to the Trojans specified address, while generally built into the port of the user's computer, and this control any computer for file delete, copy, change passwords and other illegal operations.

Draw key, talk about the difference between the two:

1, the virus is contagious, but the Trojans will not be transmitted;

2, after the invasion of computer viruses will feel, and the Trojans will not, mainly because it will carry out follow-up "work";

3, the virus mainly in "destruction" is known, but the Trojans are mainly used to steal user information.

Here, then add knowledge aspects of the worm. There are essential differences with the Trojan virus is a worm to take advantage of system vulnerabilities to propagate itself through the network of malicious programs, it does not need attached to other programs, but independent existence. When the formation of scale, will greatly consume network resources, resulting in a large area of ​​network congestion or even paralysis spread too fast, which can be much more than a Trojan terror.


Tinder answer:

Author: tinder Security Labs

Trojans are now the most popular is the "mining Trojan horse", with the rise in the price of the currency encryption, at home and abroad frequently broke a variety of "Trojan mining" event. For example tinder previously reported in the "well-known KMS activation tool includes" mining the virus' spread through the major search engines "is to" mining Trojan horse "implanted in a well-known tool for KMS activation, when users download and install this tool after infected, mining Trojans also invade your computer, using the user's computer resources, as hackers "mining" to make money.

In addition, common Trojans are the following:

The ones released
such Trojans will be hidden in the system, waiting for an opportunity to steal all kinds of user account password.

Downloader Trojan
such Trojans indirectly generate a security threat to the system, Trojan downloaders are usually smaller volumes by downloading other viruses, and supplemented by the use of seductive name and icon to trick users. Since smaller, more Trojan downloader propagation and spread quickly.

Trojan release
of such Trojans indirectly generate security threats to the system through the release of other viruses.

Clicker Trojans
such Trojans will pass to access a particular Web site to "brush flow" in the background, profit for the virus writers, and consumes network bandwidth infected host.

Agent Trojan
Such Trojans can set up a proxy server on the infected host, the hacker may be infected host as a springboard to attack the network, the identity of the infected person's hacking activities, in order to hide themselves to avoid law enforcement tracking purposes.

It must be stressed that there are now very few Trojans alone, most of them are "multi-seed virus war." Trojan downloader compact, easily be detected, it is then downloaded by the Trojan horse to another user's computer. Release is responsible for installing complex Trojan horse, once running it is difficult to release the Trojan manually cleared. There are worms and Trojans select join as a partner, while back by "WannaMine" NSA "Eternal Blue" loophole spread, that is, with the mining Trojan worm to spread.

Some virus writers will directly use the "holes" or brute force techniques, take the initiative to break the user's computer "embedded" Trojan horse, Trojan does not require users to run their own. For example, previously reported in the tinder "hidden person."

Guess you like

Origin www.cnblogs.com/jiading/p/11720750.html