{"id":6253,"date":"2017-03-29T10:14:32","date_gmt":"2017-03-29T10:14:32","guid":{"rendered":"https:\/\/www.apen.es\/?page_id=6253"},"modified":"2025-07-14T11:14:24","modified_gmt":"2025-07-14T11:14:24","slug":"trojan","status":"publish","type":"page","link":"https:\/\/www.apen.es\/en\/computer-glossary\/trojan\/","title":{"rendered":"Trojan"},"content":{"rendered":"<h2 class=\"wp-block-heading\">WHAT IS A TROJAN?<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft is-resized\"><img decoding=\"async\" src=\"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/03\/troyano.jpg\" alt=\"\" style=\"width:400px\" title=\"WHAT IS A TROJAN? - Computer Glossary\"\/><\/figure>\n<\/div>\n\n\n<p>This is malicious software, a type of malware, a type of computer virus that can be dangerous for the user who receives it. In computing, it&#039;s called a &quot;Trojan horse&quot; or Trojan horse, and these are considered dangerous because they can delete files or destroy information on the hard drive, as well as forward confidential data to an external address or open communication ports to allow an intruder to remotely access the computer.<\/p>\n\n\n\n<p>Trojans, in most cases, operate remotely under the control of an unauthorized user. Although they don&#039;t cause system damage, they can cause other problems, such as the theft of personal data.<\/p>\n\n\n\n<p>Initially, Trojans were a tool designed to cause maximum damage to computers, attempting to format the machine or delete files, but they weren&#039;t very successful because they didn&#039;t spread on their own. Now, however, cybercriminals have much greater control over this malware, which is capable of stealing banking details, usernames and passwords, or any type of personal information from users. They have even led to the creation of a new category of malware called spyware.<\/p>\n\n\n\n<p>A Trojan horse consists of a client and a server: the client is the module installed on the remote computer, and the server is the module used for remote management. If the Trojan horse&#039;s client is hidden, the antivirus software may detect it as a potential virus, or it may not detect it at all.<\/p>\n\n\n\n<p>Unlike other viruses, the goal of a Trojan horse is to give the user the ability to remotely control a computer. Generally, these programs hide within images or multimedia files (audio or video) so they can easily install themselves on the victim&#039;s computer, for example, when the user downloads files from the internet.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>What is the function of the Trojans?<\/strong><\/h3>\n\n\n\n<p>Computer Trojans are often used to remotely control computers, obtain passwords, spy on computers, damage files, assign passwords to files to bribe users, take screenshots, trick users with social engineering, and ultimately steal user information.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>How to detect the Trojan?<\/strong><\/h3>\n\n\n\n<p>In terms of computer security, a Trojan horse can open a so-called &quot;backdoor&quot; on your computer, giving hackers complete access to passwords, documents, etc.<\/p>\n\n\n\n<p>If you suspect you have a Trojan virus, you should disconnect from the internet immediately to block access for potential hackers and then remove it using a specific tool on your PC.<\/p>\n\n\n\n<p>Depending on how the connection between the management program and the resident is made, they can be classified into two types:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Direct connection: The attacker connects directly to the infected PC using its IP address. The attacking computer is the client, and the victim is the server.<\/li>\n\n\n\n<li>Indirect connection: The host or victim computer connects to the attacker through an automated process in the malicious software installed on their computer. In this case, the attacker does not need the victim&#039;s IP address. To secure the connection, the attacker can use a static IP address or a domain name.<\/li>\n<\/ul>\n\n\n\n<p>The best course of action is to avoid downloading files from websites of dubious reputation and, above all, to keep your antivirus software up to date. Similarly, to prevent Trojan intrusion, it is advisable to avoid downloading files from websites of dubious reputation and, above all, to keep your antivirus software up to date.<\/p>\n\n\n\n<p>&nbsp;Image source:&nbsp;<a href=\"https:\/\/www.mediatrends.es\/a\/112187\/dridex-virus-troyano-robar-dinero-cuenta-corriente\/\">https:\/\/www.mediatrends.es\/a\/112187\/dridex-virus-troyano-robar-dinero-cuenta-corriente\/<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>\u00bfQUE \u00c9S&nbsp;UN TROYANO? Se trata de un software malicioso, es decir, un tipo de malware, un tipo de virus inform\u00e1tico que puede llegar a ser peligroso para el usuario que lo recibe. En inform\u00e1tica se denomina \u201ccaballo de Troya\u201d o troyano&nbsp; y se consideran peligrosos, porque son capaces de eliminar ficheros o destruir informaci\u00f3n del&#8230;<\/p>","protected":false},"author":4,"featured_media":0,"parent":6185,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-landing-glosario.php","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"class_list":["post-6253","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Troyano - Apen Inform\u00e1tica<\/title>\n<meta name=\"description\" content=\"Se trata de un software malicioso, es decir, un tipo de malware, un tipo de virus inform\u00e1tico que puede llegar a ser peligroso para el usuario.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.apen.es\/en\/computer-glossary\/trojan\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Troyano - Apen Inform\u00e1tica\" \/>\n<meta property=\"og:description\" content=\"Se trata de un software malicioso, es decir, un tipo de malware, un tipo de virus inform\u00e1tico que puede llegar a ser peligroso para el usuario.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.apen.es\/en\/computer-glossary\/trojan\/\" \/>\n<meta property=\"og:site_name\" content=\"Apen Inform\u00e1tica\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/apensolucions\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-14T11:14:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/03\/troyano.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/glosario-de-informatica\\\/troyano\\\/\",\"url\":\"https:\\\/\\\/www.apen.es\\\/glosario-de-informatica\\\/troyano\\\/\",\"name\":\"Troyano - Apen Inform\u00e1tica\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/glosario-de-informatica\\\/troyano\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/glosario-de-informatica\\\/troyano\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2017\\\/03\\\/troyano.jpg\",\"datePublished\":\"2017-03-29T10:14:32+00:00\",\"dateModified\":\"2025-07-14T11:14:24+00:00\",\"description\":\"Se trata de un software malicioso, es decir, un tipo de malware, un tipo de virus inform\u00e1tico que puede llegar a ser peligroso para el usuario.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/glosario-de-informatica\\\/troyano\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.apen.es\\\/glosario-de-informatica\\\/troyano\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/glosario-de-informatica\\\/troyano\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2017\\\/03\\\/troyano.jpg\",\"contentUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2017\\\/03\\\/troyano.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/glosario-de-informatica\\\/troyano\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.apen.es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Glosario de inform\u00e1tica\",\"item\":\"https:\\\/\\\/www.apen.es\\\/glosario-de-informatica\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Troyano\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#website\",\"url\":\"https:\\\/\\\/www.apen.es\\\/\",\"name\":\"Apen Inform\u00e1tica\",\"description\":\"Mantenimiento Inform\u00e1tico , Software de Gesti\u00f3n, Soluciones de impresi\u00f3n\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.apen.es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\",\"name\":\"Apen: Soluciones inform\u00e1ticas\",\"url\":\"https:\\\/\\\/www.apen.es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/logo-apenok-231x82-1.png\",\"contentUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/logo-apenok-231x82-1.png\",\"width\":231,\"height\":82,\"caption\":\"Apen: Soluciones inform\u00e1ticas\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/apensolucions\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/ApenCentreInformatic\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/1021771?trk=tyah&trkInfo=clickedVerticalcompanyclickedEntityId1021771idx2-1-2tarId1464195271196tasapenin\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Trojan - Apen Computer Science","description":"This is malicious software, that is, a type of malware, a type of computer virus that can be dangerous for the user.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.apen.es\/en\/computer-glossary\/trojan\/","og_locale":"en_US","og_type":"article","og_title":"Troyano - Apen Inform\u00e1tica","og_description":"Se trata de un software malicioso, es decir, un tipo de malware, un tipo de virus inform\u00e1tico que puede llegar a ser peligroso para el usuario.","og_url":"https:\/\/www.apen.es\/en\/computer-glossary\/trojan\/","og_site_name":"Apen Inform\u00e1tica","article_publisher":"https:\/\/www.facebook.com\/apensolucions","article_modified_time":"2025-07-14T11:14:24+00:00","og_image":[{"url":"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/03\/troyano.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.apen.es\/glosario-de-informatica\/troyano\/","url":"https:\/\/www.apen.es\/glosario-de-informatica\/troyano\/","name":"Trojan - Apen Computer Science","isPartOf":{"@id":"https:\/\/www.apen.es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.apen.es\/glosario-de-informatica\/troyano\/#primaryimage"},"image":{"@id":"https:\/\/www.apen.es\/glosario-de-informatica\/troyano\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/03\/troyano.jpg","datePublished":"2017-03-29T10:14:32+00:00","dateModified":"2025-07-14T11:14:24+00:00","description":"This is malicious software, that is, a type of malware, a type of computer virus that can be dangerous for the user.","breadcrumb":{"@id":"https:\/\/www.apen.es\/glosario-de-informatica\/troyano\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.apen.es\/glosario-de-informatica\/troyano\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apen.es\/glosario-de-informatica\/troyano\/#primaryimage","url":"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/03\/troyano.jpg","contentUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/03\/troyano.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.apen.es\/glosario-de-informatica\/troyano\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.apen.es\/"},{"@type":"ListItem","position":2,"name":"Glosario de inform\u00e1tica","item":"https:\/\/www.apen.es\/glosario-de-informatica\/"},{"@type":"ListItem","position":3,"name":"Troyano"}]},{"@type":"WebSite","@id":"https:\/\/www.apen.es\/#website","url":"https:\/\/www.apen.es\/","name":"Apen Inform\u00e1tica","description":"IT Maintenance, Management Software, Printing Solutions","publisher":{"@id":"https:\/\/www.apen.es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.apen.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.apen.es\/#organization","name":"Apen: IT Solutions","url":"https:\/\/www.apen.es\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apen.es\/#\/schema\/logo\/image\/","url":"https:\/\/www.apen.es\/wp-content\/uploads\/2022\/08\/logo-apenok-231x82-1.png","contentUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2022\/08\/logo-apenok-231x82-1.png","width":231,"height":82,"caption":"Apen: Soluciones inform\u00e1ticas"},"image":{"@id":"https:\/\/www.apen.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/apensolucions","https:\/\/www.youtube.com\/user\/ApenCentreInformatic","https:\/\/www.linkedin.com\/company\/1021771?trk=tyah&trkInfo=clickedVerticalcompanyclickedEntityId1021771idx2-1-2tarId1464195271196tasapenin"]}]}},"taxonomy_info":[],"featured_image_src_large":false,"author_info":{"display_name":"marqueting","author_link":"https:\/\/www.apen.es\/en\/blog\/author\/marqueting\/"},"comment_info":0,"_links":{"self":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/pages\/6253","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/comments?post=6253"}],"version-history":[{"count":1,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/pages\/6253\/revisions"}],"predecessor-version":[{"id":56589,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/pages\/6253\/revisions\/56589"}],"up":[{"embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/pages\/6185"}],"wp:attachment":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/media?parent=6253"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}