top of page

A Trojan Horse of Psychic Attacks

So I had almost a whole page written out where I went into a full ramble and introduced too many new concepts, and in honouring my recent progression into Refinement > Eloquence Teachings then I'm getting straight into it without going into any other sidenotes or explanations. Perhaps it's a video explanation so I'll stick to just this concept here.

Imagine a concept where another being attempting to penetrate your field sneakily/malicious intent sends out/in artificial frequencies of love joy and or bliss to attempt to drop your guard and allow something not so blissful in. Not surprisingly there is also a complementary term in the computer world, I've included the types below as it's interesting to overlay these to the human bodysuit/system. So now we are not only having to discern between good and bad energies but between good good and good (trojan). Though, this technique can also be a useful offensive not that I am encouraging that in anyway. I'm relating it to the battle at Troy but reports are mixed as to whether this 'actually' occured or not.


I think I've conveyed my 'gist' wrt how something like this may or may not present.





From https://owasp.org/www-community/attacks/Trojan_Horse

A Trojan Horse is a program that uses malicious code masqueraded as a trusted application. The malicious code can be injected on benign applications, masqueraded in e-mail links, or sometimes hidden in JavaScript pages to make furtive attacks against vulnerable internet Browsers.

Other details can be found in Man-in-the-browser attack.

The 7 Main Types of Trojan Horse

  1. Remote Access Trojan (RAT): Designed to provide the attacker full control of the infected machine. Trojan horse usually masqueraded as a utility.

  2. Data Sending Trojan: Trojan horse that uses keylogger technology to capture sensitive data like passwords, credit card and banking information, and IM messages, and sends them back to the attacker.

  3. Destructive Trojan: Trojan horse designed to destroy data stored on the victim’s computer.

  4. Proxy Trojan: Trojan horse that uses the victim’s computer as a proxy server, providing the attacker an opportunity to execute illicit acts from the infected computer, like banking fraud, and even malicious attacks over the internet.

  5. FTP Trojan: This type of Trojan horse uses the port 21 to enable the attackers to connect to the victim’s computer using File Transfer Protocol.

  6. Security software disabler Trojan: This Trojan horse is designed to disable security software like firewall and antivirus, enabling the attacker to use many invasion techniques to invade the victim’s computer, and even to infect more than the computer.

  7. Denial-of-Service attack Trojan: Trojan horse designed to give the attacker opportunity to realize Denial-of-Service attacks from victim’s computer.



bottom of page