This document provides an introduction to trojans and backdoors, including what they are, how they work, common types of trojans, and methods of detecting trojan activity. Trojans and backdoors allow hackers to send and receive data through open ports to gain control of systems. Common trojan types include remote access trojans, data sending trojans, and trojans that disable security software. Netstat and Wireshark can be used to monitor network activity and detect trojans. Wrappers and defacing applications help disguise trojans by changing file icons or combining with other programs.