What Is a Trojan Horse Virus?
Like the legendary Greek weapon, a Trojan Horse computer virus sneaks in under the radar to wreak havoc on a system or network. According to Tech FAQ, "This is a type of virus that attempts to make the user think that it is a beneficial application...once executed or installed in the system, this type of virus will start infecting other files in the computer." From that point, it's a tough battle to isolate the virus. By the time the user finds out that something is wrong (usually through sluggish performance or odd pop-up windows), the virus may have already transmitted private information like credit card numbers, passwords and account information. An untended infestation will likely result in a crash of the operating system.
How Do Computers Get Trojan Horses?
Most trojans are introduced through careless downloading: email or instant messenger attachments and peer-to-peer files are common culprits. The user clicks on a file, not noting that it has an .exe or other executable file suffix. The program loads and takes root, slowly weeding through the operating system and software. Some trojans are so advanced that they can tap into an address book, email each person, and attach itself to the outgoing mail.
Trojans can also transmit through networks, especially ones that don't have effective firewall or anti-virus protection. If one trojan is opened from several terminals, the infestation can quickly spread to servers and critical files. From there, thieves can remotely download client credit card information. Several security breaches with thousands of compromised names have made headlines in the last few years alone.
How Can People Fight Trojan Horse Viruses?
The best way to prevent a Trojan Horse Virus from entering and infecting your computer is to never open email attachments or files that have been sent by unknown senders," Tech FAQ advises. TR Brown of Security Pro News suggests always keeping anti-virus software up to date, installing a trusted firewall and staying away from downloads from unknown sites. Also pay attention to clicking links from Google and other search engines; they'll often report suspicious or potentially dangerous content near the link. Trojans are nasty characters, but they're easy to avoid if you utilize the right tools.
Read more: http://goo.gl/Js4ES
How Is a Trojan Horse Transmitted ?
Monday, July 11, 2011 |
Posted by
SofiaBrown185
Subscribe to:
Post Comments (Atom)
Partners Links
Love SMS
Antivirus Support
efix scam|efixeFix Scam
Windows 8 Download
Windows 8 Upgrade
Windows 8 Wallpaper
franchise | franchise India | franchise opportunities | franchise retail | food franchise|office 2010 excel |
Microsoft PowerPoint 2010 |
Microsoft Outlook 2010 |
Microsoft Word 2010 |
Microsoft Office 2010 |
Microsoft Office Support |
Microsoft OneNote 2010 |
Microsoft Access 2010 |
Microsoft Publisher 2010 |
Microsoft Infopath 2010 |
Microsoft SharePoint 2010 |
Microsoft Communicator 2010 |
Microsoft Visio 2010 |
Microsoft Project 2010
Labels
- anti virus news (1)
- anti-virus for mobiles (1)
- Antimalware Doctor Virus (1)
- antivirus (2)
- antivirus help (1)
- antivirus latest info (1)
- antivirus news (4)
- antivirus protection (1)
- antivirus security (3)
- antivirus updates (2)
- antivirus upgrade (2)
- best antivirus (1)
- Criteria For The Best Antivirus Software (2)
- Facebook security (1)
- firewall (1)
- How Is a Trojan Horse Transmitted (1)
- How to Remove the Mass Mailing Worm (1)
- install antivirus (2)
- intall antivirus (2)
- Kaspersky antivirus support (1)
- know your antivirus (1)
- Look Out For the Rogue Antivirus (1)
- McAfee (1)
- McAfee Antivirus (3)
- McAfee Support (2)
- New virus bouncing around the Net (1)
- PC Antivirus (1)
- Remove the Mass Mailing Worm (1)
- SmitFraud Antivirus (1)
- SmitFraud Antivirus problems (1)
- Trojan Pop-Ups and Tracking Cookies Help (1)
- virus and worms (1)
- virus removal (1)
- virus threat (3)
- virus-threat (1)
- Viruses With Anti-Malware (1)
- Viruses With Anti-Malware removal (1)
- windows7 help (1)
- windows7 support (1)
0 comments:
Post a Comment