How to fight computer viruses, spyware and malware
Page: Trojan Horse

Trojan Horse

Greek Myth or Computer Nemesis?

This is yet another form of tricking you into believing that some program will be helpful to you, while actually doing exactly opposite - harmig your computer and even stealing your personal info stored in your files. While trojans are not viruses, they often can behave like computer viruses would do.

What is a Trojan Horse?

We have all heard the term Trojan Horse, but what exactly is it? A Trojan Horse is a destructive program that masquerades as a harmless application. Unlike viruses, Trojan Horses do not replicate themselves, but they can be just as destructive. One of the most dangerous examples of a Trojan is a program that promises to rid your computer of viruses but instead introduces viruses into your computer.

The Trojan can be tricky. Who hasn’t been online and had an advertisement pop up claiming to be able to rid your computer of some nasty virus? Or, even more frightening, you receive an email that claims to be alerting you to a new virus that can threaten your computer. The sender promises to quickly eradicate, or protect, your computer from viruses if you simply download their "free", attached software into your computer. You may be skeptical but the software looks legitimate and the company sounds reputable. You proceed to take them up on their offer and download the software. In doing so, you have just potentially exposed yourself to a massive headache and your computer to a laundry list of ailments.

When a Trojan is activated, numerous things can happen. Some Trojans are more annoying than malicious. Some of the less annoying Trojans may choose to change your desktop settings or add silly desktop icons. The more serious Trojans can erase or overwrite data on your computer, corrupt files, spread other malware such as viruses, spy on the user of a computer and secretly report data like browsing habits to other people, log keystrokes to steal information such as passwords and credit card numbers, phish for bank account details (which can be used for criminal activities), and even install a backdoor into your computer system so that they can come and go as they please.

How to avoid encountering a Trojan Horse

To increase your odds of not encountering a Trojan, follow these guidelines.

1. Remain diligent

Trojans can infect your computer through rogue websites, instant messaging, and emails with attachments. Do not download anything into your computer unless you are 100 percent sure of its sender or source.  

2. Keep your operating system updated

Ensure that your operating system is always up-to-date. If you are running a Microsoft Windows operating system, this is essential.  

3. Install reliable anti-virus software

It is also important that you download any updates frequently to catch all new Trojan Horses, viruses, and worms. Be sure that the anti-virus program that you choose can also scan e-mails and files downloaded through the internet.  

4. Consider installing a firewall

A firewall is a system that prevents unauthorized use and access to your computer. A firewall is not going to eliminate your computer virus problems, but when used in conjunction with regular operating system updates and reliable anti-virus software, it can provide additional security and protection for your computer.  

Nothing can guarantee the security of your computer 100 percent. However, you can continue to improve your computer's security and decrease the possibility of infection by consistently following the above guidelines. And above all, if in doubt, leave out - you'll be surprised how often 'common sense' will save you.

Computer Virus Articles:


Home
Computer Security
   Computer Protection
   Computer Security Threats
   Computer Security Watch
   Crackdown on Security
   Intrusion Detection Systems
   Securing Your Computer
   Online Security Rules
   Security Suites
Computer Virus
   Computer Virus Prevention
   Computer Virus Protection
   Antivirus Programs Tips
   Computer Viruses
   Fighting Viruses
   Avast Antivirus
   Norton Antivirus
   Trojan Horse
   Zone Alarm
Computer Spyware
   Adware
   Botnets
   Spyware
   CounterSpy
   Spyware Programs
   Intelligent Explorer
   Spyware Remover
Computer Privacy
   Identity Protection
   Fighting Spam
   Encryption
   Keylogger
   Phishing
Computer Software
   Anti Spam Software
   Microsoft Office 2003
   Software-Defined Storage
   Software Products
   Software Testing Service
Internet Security
   Business Internet Security
   Company Sued for Data Breach
   Cyber Security Affects Reputation
   Cyber Security and Small Business
   Cyber Security Culture Change
   Cyber Security for E-Commerce
   Cyber Security Future Trends
   File Sharing Security
   Handle Company Data Breach
   Internet Security Issues
   Third Party Vendor Security
   Wireless Hot Spots
Mobile Security
   Protect iPhone from Viruses
   Stay Secure While Travelling
Web Hosting
   All About Web Hosting
   Choosing Hosting Packages
   Web Hosting Services
   Website Security Myths
Updates
About
Contact
Guest Posts
Links
Link to us

Home
Computer Security
Computer Virus
Computer Spyware
Computer Privacy
Computer Software
Internet Security
Mobile Security
Web Hosting
Updates
About
Contact
Guest Posts
Links
Link to us
Privacy Policy