abalfazl — 2010-10-15T09:37:49-04:00 — #1
what is difference between rootkit and trojan?
logic_earth — 2010-10-15T13:47:22-04:00 — #2
doug_g — 2010-10-15T17:21:36-04:00 — #3
trojans are evil
rootkits are really, really, really evil.
rosblanc — 2010-10-20T13:31:19-04:00 — #4
Rootkits, are hidding in your OS system core, and trojan can hide or not, and a trojan can give access to your computer to a hacker or identity theft, and a rootkit mayorly just mess up with your computer.
abalfazl — 2010-10-24T02:32:58-04:00 — #5
Rootkits, are hidding in your OS system core, and trojan can hide or not,
Dear Ros may you explain more about the advantage of this?
svcghost — 2010-10-24T03:21:39-04:00 — #6
p.s. a trojan is anything that does something not expected of it.. or something other than what it appears to do or says it will do. So that's already a huge difference.
rosblanc — 2010-10-25T11:53:23-04:00 — #7
Here are the definitions:
A Trojan horse, or Trojan, is malware that appears to perform a desirable function for the user prior to run or install but instead facilitates unauthorized access of the user's computer system. "It is a harmful piece of software that looks legitimate. Users are typically tricked into loading and executing it on their systems"
A rootkit is software that enables continued privileged access to a computer, while actively hiding its presence from administrators by subverting standard operating system functionality or other applications. Typically, a hacker installs a rootkit on a computer after first obtaining user-level access, either by exploiting a known vulnerability or cracking a password. Once a rootkit is installed, it allows an attacker to mask the active intrusion and to gain privileged access to a computer by circumventing normal authentication and authorization mechanisms. Although rootkits can serve a variety of ends, they have gained notoriety primarily as malware, appropriating computing resources or stealing passwords without the knowledge of administrators and users of affected systems. Rootkits can target firmware, a hypervisor, the kernel or, most commonly, user-mode applications.
Hopes this help! Take care!
abalfazl — 2010-10-25T14:53:52-04:00 — #8
Thank you very much Ros, But may you explain more about advantage of hide in core for rootkits?
rosblanc — 2010-10-25T15:04:02-04:00 — #9
Well if you can talk about "advantages", maybe it's that they can hide very deep into the system files, and also can mask themselves as legitimate software, and they can harm a lot your OS. Like slow them down, kill processes, copy themselves, and erase system files.