Board logo

subject: How to Protect Computer against Trojan Horse? [print this page]


About 83-percent of the global malwares detected in the world, they are Trojans by types. It is one kind of computer virus which is spread through an instant-messaging network and email attachment. A Trojan Horse at first glance may appear to be an useful software but will actually do damage once installed or run on a computer. It is usually tricked in such a way for opening them as they appear to be a legitimate software or files from a legitimate source.

The results of Trojan activation can vary according to its design. Some are annoying than to be malicious like changing desktop background, adding active desktop icons or they can damage a system by deleting files and destroying information. Trojans also creates backdoor on PC that gives malicious users access to it, allowing confidential or personal information to be compromised.

A Trojan horse is a malware that appears to perform a desirable function for the user prior to run or install and facilitates unauthorized access of the user's computer system.

Let's have a look at the sources from where Trojan horses can get installed. It might be installed through irrelevant software downloads from unsecured websites, bundling with applications downloaded from a network, malicious email attachments, executable websites' contents in the form of an ActiveX control, application exploitations like flaws in a Web browser, media player, instant-messaging client, etc. Trojan horses may be embedded in image files shared online.

What could be the results of attack? Trojan horse can allow operations to hackers on computers. A Trojan can use the machine as part of a botnet, steal data like retrieving passwords or credit card information, installation of software, including third-party malware, download or uploading of files on the user's computer, modification or deletion of files, watch the user's screen remotely as well as crashing the computer and keystroke logging.

Wondering how to protect computer against Trojan Horse? Stop executing programs unless from a trusted source as well as stop opening e-mail attachments unless from known, especially attachments with the extensions ".exe," ".ink" and ".vbs." Update antivirus and security software on a regular basis. Install patches and security updates for operating system and software. Before using homemade CDs and floppy disks in your computer, scan them with your anti-virus software. Never accept programs from instant messaging applications. To prevent infections by malware while surfing the web, strengthen your browser by enabling automatic prompting for ActiveX controls option and the Prompt function in the Download and run ActiveX controls and plug-ins options to accept or refuse the execution of ActiveX controls.

If your computer is already infected by Trojan, you can consult a remote computer support for tech support to resolve the issue or can also try some simple things. If you are using operating systems such as Windows XP or ME, you must disable your System Restore before attempting any removal. After successful removal, you can re-enable System Restore. In "safe mode", run Ad-aware, and if still needed, Spybot. If you have the paid versions of these products, make sure you installed the "add-ons" they have. Reboot your system in normal mode and run Ad-Aware and Spybot again. Using the same System Restore procedure as above, turn it back on.

How to Protect Computer against Trojan Horse?

By: James Madison




welcome to loan (http://www.yloan.com/) Powered by Discuz! 5.5.0