
A backdoor Trojan(security threat) allows someone to take control of another user’s
computer via the internet without their permission.
A backdoor Trojan(security threat) may pose as legitimate software, just as other Trojan horse programs
do, so that users run it. Alternatively – as is now increasingly common – users may
allow Trojans onto their computer by following a link in spam mail.
Once the Trojan is run, it adds itself to the computer’s startup...