Trojan Horse Greek Myth Or Your Personal Computer Nemesis

| Total Words: 529

Trojan Horse Greek Myth Or Your Personal Computer Nemesis – It Is Your Choice

In Greek Mythology, Odysseus tricked the Trojans into letting the Greek army into the impregnable gates of Troy by having his men convert one of their ships into a huge wooden horse, presenting it as a gift with all his troops inside. Shown to beautiful effect by the Brad Pitt film Troy, the tactic is unfortunately used in the computing world in exactly the same way.

Trojan Horses are programs that masquerade as something harmless. They don’t replicate themselves, they don’t destroy your data, and they don’t seem to do anything. Dont be fooled. Trojan Horses do their dirty work, like the Greeks of myth, by being the “inside man” they’ll disable your firewall protection, opening ports for botnet masters to turn your computer into a zombie, they’ll promise to remove viruses while downloading installation packages for them, or they’ll invite keystroke loggers to steal your personal information and send it out on the Internet for people who’ll use the information to do untold harm to you.

Most Trojan Horses, like phishing...

To view and download this full PLR article, you must be logged in. Registration is completely free. Once you create your account, you will be able to browse, search & downlod from our PLR articles database of over "1,57,897+" on 1,000's of niches and 200+ categories without paying a penny. Click here to signup...

** PLR to VIDEO: Create Awesome Videos From PLR Articles... FAST!...