TROJAN HORSE



What Is Trojan.............?

                   Trojans are the programs designed by hacker to get  remote access to a targeted computer system .Once a Trojan has been installed on a targeted computer system, hackers may be given remote access to the computer allowing them to perform all kinds of operations.They are not just like viruses,because they are not replicating itself.But it spreads quickly via Internet communication.

Operation Of  Trojans..

1.Watching the user's screen

2.Crashing the computer

3.Keystroke logging (Including usernames and password )

4.Use of the machine as part of a botnet (e.g. to perform  
  automated spamming or to distribute Denial-of-service attacks)

5.Electronic money theft

6.Data theft (e.g. retrieving passwords or credit card
  information)

7.Installation of software, including third-party malwares

8.Downloading or uploading of files on the user's computer

9.Modification or deletion of files

10.Anonymising internet viewing


How To Avoid Trojan Horse Infection ?


1.Don't script,don't try to paste or type some scripts on your web-
  browser.That may gives full access of
  your system to a malicious hacker.

2.Never download files blindly,you have to check that file before you downloading it.www.virustotal.com
   may help you.

3.Open the files after scanning it using a updated antivirus software,even it comes from your friend.

4.Beware of hidden file extensions,windows usually hides the extension of a file.For an example,smile.jpg
   might really be smile.jpg.exe !.Yes,It may be a executable Trojan.

5.Remember a truth:You are not well protected.

newer post older post Home