Rootkits are designed to conceal certain objects or activities in your system. ExploitĮxploits are programs that contain data or code that take advantage of a vulnerability within an application on your computer. Furthermore, backdoors can allow code and commands to be executed on your device or monitor your web traffic. Without your knowledge, your computer becomes part of a zombie network that is used for attacks. A backdoor is often used to set up botnets. This is because they can either load all sorts of malware onto your system in their role as a gateway, or at least ensure that your computer is vulnerable to attack. They are one of the simplest but potentially most dangerous types of Trojan. Unlike computer viruses and worms, Trojans are not able to self-replicate. Disrupting the performance of computers or computer networks.It does this by reading passwords, recording keyboard strokes or opening the door for further malware that can even take the entire computer hostage. For what once stood for a brilliant trick and a masterful feat of engineering is nowadays regarded as a malicious digital pest whose sole aim is to wreak havoc on its victims' computers unnoticed. Thousands of years later, the myth of the Trojan horse still lives on, albeit today in an unflattering connotation. The Greeks had finally succeeded in capturing the long besieged city of Troy, bringing the Trojan War to an end. When the horse's belly opened at night it was too late.