An important key to safe computing is to never use software from unknown sources. As pointed out in a CERT advisory, malicious users often use "Trojan Horses" to deliver harmful software onto unwary users' computers. A Trojan Horse is a piece of software that appears to do something useful, but which actually performs hidden, usually damaging, action on the user's computer. For example, a malicious user might develop a game program that deliberately erases files on the user's computer while it runs, and distribute it via a web site.
|