Make your own free website on Tripod.com

The MIRC Workshop
Tutorials, Scripts and Help Files for mIRC

MIRC Workshop mIRC Help Files Scripts & Scripting mIRC Downloads mirc script writer
Back / Index / Next

Return To Main MIRC Menu

  IRC Warfare  

Trojan Horse Attacks

Trojan software has nothing to do with condoms, except perhaps that the parents of the Trojan sender should have used a condom. Trojans are named after the Trojan horse of legend, used by the Greeks to end the siege of Troy.

The trojan horse was seen as something valuable and welcome to the Trojan people and they accepted it in, past their defenses, but it was really just a vessel for the enemy who crept out when the Trojans were not watchful.

A Trojan in internet terms will likely appear to be a desireable piece of software. One was hidden in a South Park screensaver for instance. Inside the useful software is the enemy code. It is usually a hidden server opening up remote access to your computer. Anyone can then connect to the trojan's server and do anything they want with your system. They can view and download your files. They can delete whole directories. They can set a password on your screensaver locking you out of your own system.

This isnt hacking, since its just a user with a malicious program. If you don't accept and run the trojan it can't harm you and the attacker can't gain access. A person who can use a trojan is no closer to being a hacker than a person who can press a key on a typewriter is to being Ernest Hemmingway.

The common advice about trojans is not to accept any file at all from people you don't trust implicitly. I don't fully go along with that. I say don't accept executable files from anyone you don't trust to have fully checked and swept all their own files for viruses and trojans.

The point of trojans is that they are hidden. If the application the trojan is hidden inside is good then people who don't know theres a trojan in it may well share the software with their friends, thus unwittingly affecting people who trust them. Its not whether you trust the sender, its whether you trust the software itself as well.

However, in practice, everyone can be persuaded to accept an unsafe file if the right pitch is made by the right person. Remember that when tempted to accept anything from anyone and be sure you have backed up your system and have good anti-trojan and anti-virus software.

I mentioned Puppet in the page on Nukes. he is the author of the much-acclaimed NukeNabber and has also created a great anti-trojan program called The Cleaner. If you are ever going to accept a file from anyone, including e-mail attachments then get The Cleaner now!

For anti-virus protection you really should have installed that before even getting an ISP. The net is full of old viruses, hidden in everything from html enabled e-mail to Word documents. Most viruses are passed on unwittingly, not by enemies, but by trusted friends. Try Norton Anti-virus or similar.

Beyond.com offer a wide range of bargains on software of all kinds. You should ensure that you have anti-virus software, good backup software, and whatever bug detection software you feel able to use.

Protect yourself ... its not anyone else's responsibility and its all too common to hear people who thought it didnt apply to them. If you dont have the latest anti-virus protection then this does apply to YOU

  Further Reading  

IRChelp.org - Trojan Page has all the basic information plus a good set of links to fix some of the specific trojans known to be in circulation.


Back to Top of Page

Return To Main MIRC Menu

Back / Index / Next



©1999 The Black Knight
MIRC Workshop
What's New
Site Map
MIRC Links
Link to Us
The Author
IRC chat basics
IRC Chat Use
IRC Warfare
No-Tech Attacks
Floods / Flooding
Nukes / Nuking
Trojans / Trojan
Hacks / Hacking
What's mIRC?
mIRC Set-up
Connect Options
IRC Options
DCC Options
Display Options
General Options
mIRC Basics
Beginner Guide
MIRC Colours
MIRC Commands
MIRC Identifiers
MIRC Variables
MIRC If-Then-Else
Alias Scripts
Popups Scripts
- Text Popups
- Popup Controls
- Files Popups
- Info Popups
Events Scripts
Remotes Scripts
Scripting Applet
Downloads Area

Rate This Site.
 

Copyright ©2001 MIRC Workshop
All rights reserved

Search engine optimisation positioning tutorials| Internet Marketing Consultant

Back To Top