Traditional Culture Encyclopedia - Hotel accommodation - The "Trojan Horse Strategy" in ancient Greek mythology?

The "Trojan Horse Strategy" in ancient Greek mythology?

Trojan horse (hereinafter referred to as Trojan horse) is called "Trojan horse" in English. Its name is taken from the Trojan horse in Greek mythology.

In ancient Greek legend, the Trojan prince Paris visited Greece and lured Queen Helen away, so the Greeks expedition to Troy. After nine years of siege, in the tenth year, the Greek general Odysseus came up with a plan, which was to ambush a group of warriors in the belly of a huge wooden horse and place them outside the city to pretend to retreat. The Trojans thought that the enemy troops had retreated, so they took the Trojan horse into the city as a trophy. At night, the warriors who were hiding in the wooden horse jumped out and opened the city gate. The Greek soldiers rushed in and captured the city. Later, people often used the allusion of "Trojan horse" when writing articles to describe the activities of laying an ambush in the enemy's camp.

In the computer field, it is a method based on remote control. Hacking tools are concealed and unauthorized.

The so-called concealment means that in order to prevent the Trojan from being discovered, the designers of the Trojan will use various methods to hide the Trojan. In this way, even if the server is found to be infected with the Trojan, it can often only look at it because it cannot determine its specific location. "Horse" sighed.

The so-called non-authorization means that once the control terminal is connected to the server, the control terminal will enjoy most of the operating rights of the server, including modifying files, modifying the registry, controlling the mouse, keyboard, etc., and these The power is not given by the server, but stolen through the Trojan horse program.

From the perspective of Trojan development, it can basically be divided into two stages.

At the beginning, when the Internet was still based on the UNIX platform, Trojan horses were produced. The functions of Trojan horse programs at that time were relatively simple. They often embedded a program into a system file and used jump instructions to execute it. Some Trojan functions. During this period, most Trojan designers and users were technical personnel and must have considerable network and programming knowledge.

As the WINDOWS platform became increasingly popular, some Trojan programs based on graphics operations appeared. The improvement of the user interface enabled users to operate Trojans skillfully without having to know too much professional knowledge. Relatively speaking, Trojan horse intrusions also occur frequently, and because the functions of Trojan horses have become increasingly perfect during this period, the damage to the server is also greater.

So Trojans have developed to this day and have used all possible methods. Once controlled by Trojans, your computer will have no secrets at all.