O'Reilly logo

How Personal & Internet Security Work by Preston Gralla

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7. How Zombies and Trojan Horses Attack You—and How to Protect Against Them

How Zombies and Trojan Horses Attack You—and How to Protect Against Them

Two of the most insidious dangers on the Internet—zombies and Trojan horses—are so good at disguising themselves that you may never know they’ve infected your computer. Yet millions of computers are unknowingly infected with these pieces of malware.

Zombies and Trojan horses (generally just called Trojans) are related dangers, and some people lump them together. But, in fact, they are usually used for very different purposes.

A zombie, sometimes called a bot (short for robot), is a computer that has been taken over by someone else to do their bidding. The reason for ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required