{"id":6253,"date":"2017-03-29T10:14:32","date_gmt":"2017-03-29T10:14:32","guid":{"rendered":"https:\/\/www.apen.es\/?page_id=6253"},"modified":"2025-07-14T11:14:24","modified_gmt":"2025-07-14T11:14:24","slug":"troia","status":"publish","type":"page","link":"https:\/\/www.apen.es\/ca\/glossari-dinformatica\/troia\/","title":{"rendered":"Troi\u00e0"},"content":{"rendered":"<h2 class=\"wp-block-heading\">QU\u00c8 \u00c9S UN TROI\u00c0?<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft is-resized\"><img decoding=\"async\" src=\"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/03\/troyano.jpg\" alt=\"\" style=\"width:400px\" title=\"QU\u00c8 \u00c9S UN TROI\u00c0? - Glossari d&#039;inform\u00e0tica\"\/><\/figure>\n<\/div>\n\n\n<p>Es tracta d&#039;un programari malici\u00f3s, \u00e9s a dir, un tipus de codi malici\u00f3s (malware), un tipus de virus inform\u00e0tic que pot arribar a ser perill\u00f3s per a l&#039;usuari que el rep. En inform\u00e0tica s&#039;anomena &quot;cavall de Troia&quot; o troi\u00e0 i es consideren perillosos, perqu\u00e8 s\u00f3n capa\u00e7os d&#039;eliminar fitxers o destruir informaci\u00f3 del disc dur, aix\u00ed com reenviar dades confidencials a una adre\u00e7a externa o obrir ports de comunicacions per obrir les portes a un intr\u00fas, amb el ferm objectiu d&#039;accedir a l&#039;ordinador mitjan\u00e7ant control remot.<\/p>\n\n\n\n<p>Els troians, en la majoria de casos, funcionen per control remot per part d&#039;un usuari no autoritzat. Encara que no causa danys al sistema, causen un altre tipus de problemes com el robatori de dades personals, per exemple.<\/p>\n\n\n\n<p>Al principi, els troians eren una eina per causar el major dany possible als equips inform\u00e0tics, tractant de formatar l&#039;ordinador o eliminant arxius, per\u00f2 no van tenir gaire \u00e8xit perqu\u00e8 no es propagaven per si mateixos. Ara, en canvi, els ciberdelinq\u00fcents aconsegueixen controlar molt m\u00e9s aquest codi malici\u00f3s, que \u00e9s capa\u00e7 de robar dades banc\u00e0ries, noms i contrasenyes d&#039;usuaris o qualsevol tipus d&#039;informaci\u00f3 personal als usuaris. Fins i tot, han donat lloc a la creaci\u00f3 duna nova categoria de malware anomenada Spyware, un programa espia.<\/p>\n\n\n\n<p>Un troi\u00e0 est\u00e0 conformat per un client i un servidor: el client \u00e9s el m\u00f2dul que s&#039;instal\u00b7la a l&#039;equip remot i el servidor \u00e9s el m\u00f2dul que es fa servir per fer la gesti\u00f3 remota. Si el client del troi\u00e0 est\u00e0 ocult, l&#039;antivirus el detecta com si es tract\u00e9s d&#039;un virus potencial o potser ni tan sols ho arribi a detectar.<\/p>\n\n\n\n<p>A difer\u00e8ncia d&#039;altres virus, l&#039;objectiu del troi\u00e0 \u00e9s oferir a l&#039;usuari la possibilitat d&#039;exercir un control remot sobre un ordinador. En general, es tracta de programes que s&#039;amaguen en imatges o arxius multim\u00e8dia (\u00e0udio o v\u00eddeo), perqu\u00e8 s&#039;instal\u00b7lin f\u00e0cilment a l&#039;equip de la v\u00edctima, com ara quan l&#039;usuari descarrega arxius a Internet.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Quina funci\u00f3 tenen els troians?<\/strong><\/h3>\n\n\n\n<p>Els troians inform\u00e0tics solen utilitzar-se per tenir control remot d&#039;equips, obtenir contrasenyes, espiar equips, danyar fitxers, assignar contrasenyes a fitxers per subornar els usuaris, prendre captures de pantalla, enganyar els usuaris amb enginyeria social i, en definitiva, robar informaci\u00f3 de l&#039;usuari.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Com detectar el troi\u00e0?<\/strong><\/h3>\n\n\n\n<p>Pel que fa a la seguretat inform\u00e0tica, un troi\u00e0 pot obrir una suposada \u201cporta del darrere\u201d al teu ordinador, per brindar als hakers un complet acc\u00e9s a contrasenyes, documents, etc.<\/p>\n\n\n\n<p>Si sospites que tens un virus troi\u00e0, t&#039;has de desconnectar d&#039;internet de manera immediata, per poder bloquejar l&#039;acc\u00e9s als hakers potencials i eliminar-lo, despr\u00e9s, des d&#039;una eina espec\u00edfica des del PC<\/p>\n\n\n\n<p>Segons la manera com es realitza la connexi\u00f3 entre el programa d&#039;administraci\u00f3 i el resident es poden classificar en dos tipus:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Connexi\u00f3 directa: L&#039;atacant es connecta directament al PC infectat, mitjan\u00e7ant la vostra adre\u00e7a IP. L&#039;equip atacant \u00e9s el client i la v\u00edctima el servidor.<\/li>\n\n\n\n<li>Connexi\u00f3 indirecta: L&#039;equip host o v\u00edctima es connecta a l&#039;atacant mitjan\u00e7ant un proc\u00e9s autom\u00e0tic al programari malici\u00f3s instal\u00b7lat al vostre equip. En aquest cas, no \u00e9s necessari per a l&#039;atacant tenir l&#039;adre\u00e7a IP de la v\u00edctima. Perqu\u00e8 la connexi\u00f3 sigui assegurada. L&#039;atacant pot fer servir una IP fixa o un nom de domini.<\/li>\n<\/ul>\n\n\n\n<p>El millor \u00e9s evitar qualsevol desc\u00e0rrega d&#039;arxius des de p\u00e0gines web de reputaci\u00f3 dubtosa i, sobretot, tenir al dia l&#039;antivirus.<\/p>\n\n\n\n<p>&nbsp;Font imatge:&nbsp;<a href=\"https:\/\/www.mediatrends.es\/a\/112187\/dridex-virus-troyano-robar-dinero-cuenta-corriente\/\">https:\/\/www.mediatrends.es\/a\/112187\/dridex-virus-troyano-robar-dinero-cuenta-corriente\/<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>\u00bfQUE \u00c9S&nbsp;UN TROYANO? Se trata de un software malicioso, es decir, un tipo de malware, un tipo de virus inform\u00e1tico que puede llegar a ser peligroso para el usuario que lo recibe. En inform\u00e1tica se denomina \u201ccaballo de Troya\u201d o troyano&nbsp; y se consideran peligrosos, porque son capaces de eliminar ficheros o destruir informaci\u00f3n del&#8230;<\/p>","protected":false},"author":4,"featured_media":0,"parent":6185,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-landing-glosario.php","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"class_list":["post-6253","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Troyano - Apen Inform\u00e1tica<\/title>\n<meta name=\"description\" content=\"Se trata de un software malicioso, es decir, un tipo de malware, un tipo de virus inform\u00e1tico que puede llegar a ser peligroso para el usuario.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.apen.es\/ca\/glossari-dinformatica\/troia\/\" \/>\n<meta property=\"og:locale\" content=\"ca_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Troyano - Apen Inform\u00e1tica\" \/>\n<meta property=\"og:description\" content=\"Se trata de un software malicioso, es decir, un tipo de malware, un tipo de virus inform\u00e1tico que puede llegar a ser peligroso para el usuario.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.apen.es\/ca\/glossari-dinformatica\/troia\/\" \/>\n<meta property=\"og:site_name\" content=\"Apen Inform\u00e1tica\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/apensolucions\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-14T11:14:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/03\/troyano.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Temps estimat de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minuts\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/glosario-de-informatica\\\/troyano\\\/\",\"url\":\"https:\\\/\\\/www.apen.es\\\/glosario-de-informatica\\\/troyano\\\/\",\"name\":\"Troyano - Apen Inform\u00e1tica\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/glosario-de-informatica\\\/troyano\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/glosario-de-informatica\\\/troyano\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2017\\\/03\\\/troyano.jpg\",\"datePublished\":\"2017-03-29T10:14:32+00:00\",\"dateModified\":\"2025-07-14T11:14:24+00:00\",\"description\":\"Se trata de un software malicioso, es decir, un tipo de malware, un tipo de virus inform\u00e1tico que puede llegar a ser peligroso para el usuario.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/glosario-de-informatica\\\/troyano\\\/#breadcrumb\"},\"inLanguage\":\"ca\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.apen.es\\\/glosario-de-informatica\\\/troyano\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/glosario-de-informatica\\\/troyano\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2017\\\/03\\\/troyano.jpg\",\"contentUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2017\\\/03\\\/troyano.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/glosario-de-informatica\\\/troyano\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.apen.es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Glosario de inform\u00e1tica\",\"item\":\"https:\\\/\\\/www.apen.es\\\/glosario-de-informatica\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Troyano\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#website\",\"url\":\"https:\\\/\\\/www.apen.es\\\/\",\"name\":\"Apen Inform\u00e1tica\",\"description\":\"Mantenimiento Inform\u00e1tico , Software de Gesti\u00f3n, Soluciones de impresi\u00f3n\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.apen.es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ca\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\",\"name\":\"Apen: Soluciones inform\u00e1ticas\",\"url\":\"https:\\\/\\\/www.apen.es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/logo-apenok-231x82-1.png\",\"contentUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/logo-apenok-231x82-1.png\",\"width\":231,\"height\":82,\"caption\":\"Apen: Soluciones inform\u00e1ticas\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/apensolucions\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/ApenCentreInformatic\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/1021771?trk=tyah&trkInfo=clickedVerticalcompanyclickedEntityId1021771idx2-1-2tarId1464195271196tasapenin\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Troi\u00e0 - Apen Inform\u00e0tica","description":"Es tracta d&#039;un programari malici\u00f3s, \u00e9s a dir, un tipus de codi malici\u00f3s (malware), un tipus de virus inform\u00e0tic que pot arribar a ser perill\u00f3s per a l&#039;usuari.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.apen.es\/ca\/glossari-dinformatica\/troia\/","og_locale":"ca_ES","og_type":"article","og_title":"Troyano - Apen Inform\u00e1tica","og_description":"Se trata de un software malicioso, es decir, un tipo de malware, un tipo de virus inform\u00e1tico que puede llegar a ser peligroso para el usuario.","og_url":"https:\/\/www.apen.es\/ca\/glossari-dinformatica\/troia\/","og_site_name":"Apen Inform\u00e1tica","article_publisher":"https:\/\/www.facebook.com\/apensolucions","article_modified_time":"2025-07-14T11:14:24+00:00","og_image":[{"url":"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/03\/troyano.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Temps estimat de lectura":"4 minuts"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.apen.es\/glosario-de-informatica\/troyano\/","url":"https:\/\/www.apen.es\/glosario-de-informatica\/troyano\/","name":"Troi\u00e0 - Apen Inform\u00e0tica","isPartOf":{"@id":"https:\/\/www.apen.es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.apen.es\/glosario-de-informatica\/troyano\/#primaryimage"},"image":{"@id":"https:\/\/www.apen.es\/glosario-de-informatica\/troyano\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/03\/troyano.jpg","datePublished":"2017-03-29T10:14:32+00:00","dateModified":"2025-07-14T11:14:24+00:00","description":"Es tracta d&#039;un programari malici\u00f3s, \u00e9s a dir, un tipus de codi malici\u00f3s (malware), un tipus de virus inform\u00e0tic que pot arribar a ser perill\u00f3s per a l&#039;usuari.","breadcrumb":{"@id":"https:\/\/www.apen.es\/glosario-de-informatica\/troyano\/#breadcrumb"},"inLanguage":"ca","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.apen.es\/glosario-de-informatica\/troyano\/"]}]},{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/www.apen.es\/glosario-de-informatica\/troyano\/#primaryimage","url":"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/03\/troyano.jpg","contentUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/03\/troyano.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.apen.es\/glosario-de-informatica\/troyano\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.apen.es\/"},{"@type":"ListItem","position":2,"name":"Glosario de inform\u00e1tica","item":"https:\/\/www.apen.es\/glosario-de-informatica\/"},{"@type":"ListItem","position":3,"name":"Troyano"}]},{"@type":"WebSite","@id":"https:\/\/www.apen.es\/#website","url":"https:\/\/www.apen.es\/","name":"Apen Inform\u00e0tica","description":"Manteniment inform\u00e0tic , programari de gesti\u00f3, solucions d&#039;impressi\u00f3","publisher":{"@id":"https:\/\/www.apen.es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.apen.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ca"},{"@type":"Organization","@id":"https:\/\/www.apen.es\/#organization","name":"Apen: Solucions inform\u00e0tiques","url":"https:\/\/www.apen.es\/","logo":{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/www.apen.es\/#\/schema\/logo\/image\/","url":"https:\/\/www.apen.es\/wp-content\/uploads\/2022\/08\/logo-apenok-231x82-1.png","contentUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2022\/08\/logo-apenok-231x82-1.png","width":231,"height":82,"caption":"Apen: Soluciones inform\u00e1ticas"},"image":{"@id":"https:\/\/www.apen.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/apensolucions","https:\/\/www.youtube.com\/user\/ApenCentreInformatic","https:\/\/www.linkedin.com\/company\/1021771?trk=tyah&trkInfo=clickedVerticalcompanyclickedEntityId1021771idx2-1-2tarId1464195271196tasapenin"]}]}},"taxonomy_info":[],"featured_image_src_large":false,"author_info":{"display_name":"marqueting","author_link":"https:\/\/www.apen.es\/ca\/blog\/author\/marqueting\/"},"comment_info":0,"_links":{"self":[{"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/pages\/6253","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/comments?post=6253"}],"version-history":[{"count":1,"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/pages\/6253\/revisions"}],"predecessor-version":[{"id":56589,"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/pages\/6253\/revisions\/56589"}],"up":[{"embeddable":true,"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/pages\/6185"}],"wp:attachment":[{"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/media?parent=6253"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}