Talk:Trojan horse (computing)

From Wikipedia, the free encyclopedia
Jump to: navigation, search

External links modified[edit]

Hello fellow Wikipedians,

I have just added archive links to one external link on Trojan horse (computing). Please take a moment to review my edit. If necessary, add {{cbignore}} after the link to keep me from modifying it. Alternatively, you can add {{nobots|deny=InternetArchiveBot}} to keep me off the page altogether. I made the following changes:

When you have finished reviewing my changes, please set the checked parameter below to true to let others know.

You may set the |checked=, on this template, to true or failed to let other editors know you reviewed the change. If you find any errors, please use the tools below to fix them or call an editor by setting |needhelp= to your help request.

  • If you have discovered URLs which were erroneously considered dead by the bot, you can report them with this tool.
  • If you found an error with any archives or the URLs themselves, you can fix them with this tool.

If you are unable to use these tools, you may set |needhelp=<your help request> on this template to request help from an experienced user. Please include details about your problem, to help other editors.

Cheers. —cyberbot IITalk to my owner:Online 04:23, 16 October 2015 (UTC)

Trojan downloader redirected here[edit]

I have redirected Trojan downloader to this article as it covers essentially the same topic and doesn't require a split at this time. --Lemongirl942 (talk) 13:30, 25 June 2016 (UTC)

"Hacking in"[edit]

It isn't useful to make "hacking in" a key part of the description. What is key is that they are malicious, and deceptive. In the next paragraph we say: "Although their payload can be anything, many modern forms act as a backdoor, contacting a controller which can then have unauthorized access to the affected computer" - surely this covers it? Snori (talk) 20:13, 3 August 2017 (UTC)

Trim[edit]

Rather than a big list of all the bad things a Trojan can do, I've given the general capabilities depending on the level of authorization. Oh, and I've trimmed 'horse' out - in practice these are now simply known as "Trojans". - Snori (talk) 08:26, 14 August 2017 (UTC)