different between trojan vs rootkit

trojan

English

Etymology

From Trojan horse.

Pronunciation

  • (UK) IPA(key): /?t???d??n/
  • (US) IPA(key): /?t?o?d??n/

Noun

trojan (plural trojans)

  1. (computing) Malware that appears to perform or actually performs a desired task for a user while performing a harmful task without the user's knowledge or consent.

Translations

Hypernyms

  • malware

Adjective

trojan (not comparable)

  1. (astronomy) Describing a satellite (moon or minor planet) that shares an orbit with another

Translations

Verb

trojan (third-person singular simple present trojans, present participle trojaning, simple past and past participle trojaned)

  1. (computing, transitive) To infect (a system) with a trojan.

Anagrams

  • jötnar

French

Noun

trojan m (plural trojans)

  1. (computing, Anglicism) trojan, Trojan horse (computing)

Related terms

  • troyen

Norwegian Nynorsk

Noun

trojan m (definite singular trojanen, indefinite plural trojanar, definite plural trojanane)

  1. form removed by a 2016 spelling decision; superseded by trojanar

Portuguese

Noun

trojan m (plural trojans)

  1. (computing) Trojan horse (malicious program disguised as legitimate software)
    Synonym: cavalo de Troia

trojan From the web:

  • what trojan virus do
  • what trojan condoms have spermicide
  • what trojan condom should i get
  • what trojan condom feels the best for the girl
  • what trojan condoms are the best
  • what trojan challenges achilles
  • what trojan horse
  • what trojan means


rootkit

English

Alternative forms

  • root kit

Etymology

root +? kit

Pronunciation

Noun

rootkit (plural rootkits)

  1. (computer security) A set of software tools used by a third party to gain unauthorized access to a computer system and control the system while concealing itself from the user.

Hypernyms

  • malware

Verb

rootkit (third-person singular simple present rootkits, present participle rootkitting, simple past and past participle rootkitted)

  1. (transitive) To infect (a computer system) with a rootkit.
    • 2000, Seth T. Ross, UNIX system security tools
      Given crackers' propensity for "rootkitting" systems — installing altered system binaries to facilitate future access — systematic integrity checks using message digest algorithms or one-way hash functions can be an important detection safeguard.
    • 2006, Ed Skoudis, Tom Liston, Counter hack reloaded
      If not, your system might have been rootkitted.

See also

  • backdoor
  • trojan
  • virus
  • worm

rootkit From the web:

  • what rootkits do
  • what rootkit scan
  • rootkit what does it mean
  • what is rootkit malware
  • what are rootkits and should i scan for them
  • what is rootkit attack
  • what are rootkits malwarebytes
  • what does rootkit modify
+1
Share
Pin
Like
Send
Share

you may also like