What is a Trojan then? This is a common yet hard to eliminate computer threat. It is a type of virus which attempts to make the computer user think that it is a advantageous application. Trojan works by hiding in a set of useful program applications. One times installed or executed in your technique, the virus will start infecting other files in your computer. The virus is as well commonly capable of stealing important info from your computer. It will then transfer this info to Web servers assigned by the virus’ developer. The developer can then be able to get control over your PC through this virus. While these stuffs occur, you may observe that your infected computer become slow and sometimes unexpected windows basically pop-up without any command from you. Later on, this can result your computer to crash. The Trojan could actually spread in lots of ways. The most usual way of infection is by means of e-mail attachments. The virus’ developer usually utilizes different spamming tactics to spread the virus to unsuspecting users.

I encountered this gem on the Vista Web-site: The Trojan-Horse-virus!
This is an e-mail virus commonly released by an e-mail attachment and if this attached file is opened, it will scour the hard drive for any financial and personal information such as the social security, PIN numbers, account numbers. When it’s collected the info, in the computer, it is transferred to the database of the thieves! Today, there’s viruses and there’s Trojan Horses. However, there is no such thing as a “Trojan virus”. Actually, the real definition of each prevents the chance of the virus’ being such a thing. Trojan doesn’t replicate but Viruses do. That truth alone implies there could never be a “Trojan Horse virus”. The description of Visa continues with this message, “A Trojan Virus is an e-mail virus commonly released by an e-mail attachment.” Well, not so. A Trojan could be sent with the attached file in e-mail, but it is definitely not an e-mail virus. (Actually, there’s some true e-mail viruses, but that is another whole topic). Therefore, it may or may not go with e-mail, and it is equally possible to have been downloaded from web-sites or resulted from P2P file transfer. Therefore, vectors have nothing to do with either something is or is not a Trojan.

The best way to prevent a Trojan Horse Virus from entering and infecting your computer is to never open email attachments or files that have been sent by unidentified senders. However, not all of the files they could get are guaranteed to be virus-free. With this, a nice way of securing your computer against malicious programs like this harmful application is to install an antivirus program and updating it.

Related Posts with Thumbnails

Share This: