Trojan 77, a virus simulator with Arduino

Trojan 77

A few years ago, only computer viruses existed in the technological world. Today that has changed and we not only find computer viruses but also malware, Trojans, phishing, viruses, hacks, etc ... A fuss in the name that many times we do not understand. For all this a user has created Trojan 77. Trojan 77 is a physical machine that uses Arduino UNO and that allows to teach and demonstrate what a Trojan virus can do in our operating system or in our machine.

Trojan 77 works like a maze machine but with some peculiarities that indicate to the user how a Trojan virus is really built and what it can do on our machine, from deleting content to leaving the door open to all kinds of access and information theft.

Trojan 77 was born as a method to teach how a Trojan virus works

The creators devised this machine to be exhibited in a museum about computers and they wanted people to learn the dangers of Trojans, but curiously the success has assailed them and they have not only created the machine but also a video that talks about the project. Unfortunately We do not have the plans or guidelines to build a similar machine, but surely, after this success we will not only see the guide in the official website but we will also see curious replicas since their base is Hardware Libre and it can be replicated.

Trojan 77 is still curious though I do not understand how a machine is necessary to explain this confusion that is slowly being corrected but still very slowly. I personally do not understand all the differences that exist between all the programs that came out of the field «Computer virus»But I do know that thanks to technologies like Arduino or Free Software, the propagation of these bad programs is difficult or impossible Do not you think?


Be the first to comment

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.