This Chapter helps you prepare for the EC-Council Certified Ethical Hacker (CEH) Exam by covering the following EC-Council objectives:
Define Trojan horse types
Trojan horse programs can be designed for any number of activities, such as remote control, covert communication, or destructive activity. If you can define them and how they work, you can prevent them from doing damage.
Explain the goal of a Trojan
Trojan programs are designed to trick the user into executing what might appear to be a legitimate program ...