1. Rootkit:
Rootkit是一套应用程序,是一种旨在感染目标PC并允许攻击者安装一组工具的恶意软件,这些工具可以授予他对计算机的持久远程访问权限。该恶意软件通常将自己伪装成“隐藏在普通视线中”的普通文件,因此您的防病毒软件会忽略它们。它使管理员级访问计算机或计算机网络成为可能。目的是从您的计算机上窃取身份信息,通常是为了获得对系统的控制权。很难检测和删除,需要专门的工具才能删除。
2.特洛伊木马:
特洛伊木马(Trojan Horse)也是一种恶意软件,它使用虚假名称来从其真实意图误导用户并执行它们。特洛伊木马通常作为合法且有用的软件安装在系统上,该软件可以向黑客提供未经授权的访问和控制。后孔,Rootkit和Beast木马是一些更有害的常见木马。
Rootkit和Trojan Horse之间的区别:
S.No. | ROOTKIT | TROJAN HORSE |
---|---|---|
1. | Rootkit is set of malicious program that enables administrator-level access to a computer network. | Trojan Horse is a form of malware that capture some important information about a computer system or a computer network. |
2. | The main objective of rootkit is to steal the identity information, often to gain control of a system. | The main objective of Trojan horse is to steal the information. |
3. | Detecting and removing a rootkit is a complex process and typically requires the use of specialized tools. | Trojan horses are detected by the antivirus software. |
4. | Rootkit is one of the type of malware. | Trojan Horse is one of the type of malware. |
5. | It give unauthorized access and control of the system to the attacker. | It can give unauthorized access and control of the system to the hackers. |
6. | It is more harmful. | It is less harmful as compared. |
7. | TDSS, ZeroAccess, Alureon and Necurs are some of the common rootkit. | Back orifice, Rootkit and Beast Trojan are some of the common Trojan horses. |