PC Security

PC Security
Recent Post
  • The Advancement of the Keylogger
  • Surfing the Web Anonymously – Questions to Ask
  • Spam Buster
  • Securing Your Computer System
  • Protection You Can Afford
  • Phishing For Your Identity
  • Parental Peace of Mind
  • Name, Rank and Social Security Number
  • How many spyware items are infecting your computer?
  • Finding the Security Suite that meets your needs
Archives
Trojan Horse….Greek Myth or Computer Nemesis?
Wednesday, January 7, 2009

We've all heard the term Trojan Horse, but what is it? A Trojan is a destructive program that masquerades as a benign application. Unlike viruses, Trojans do not replicate themselves but they can be equally destructive. One of the most dangerous of a Trojan horse is a program that promises to rid your computer of viruses but instead introduces viruses into your computer.

The Trojan can be tricky. Who has not been online and has a pop-up advertising that purports to be able to rid your computer of some nasty virus? Or, even more frightening, you receive an email claiming to be in alerting you of a new virus that can threaten your computer. The shipper agrees to promptly eliminate or to protect your computer against viruses, if you simply download their "free", attached software into your computer. May you be skeptical, but it seems legitimate to the company and its reputation. You pass them on their offer and download the software. In doing so, you've potentially exposed to a massive headache and your computer to a list of ailments laundry.

When a Trojan is activated, many things can happen. Some Trojans are more annoying than malicious. Some of these Trojans less embarrassing May choose to change your desktop settings or add silly desktop icons. The more serious Trojans can erase or overwrite data on your computer, corrupt files, spread other malware such as viruses, spyware from the user of a computer and data secret report ' browsing habits to other people, log keystrokes to steal information such as passwords and credit card numbers, phishing for bank account details (which can be used for criminal activities), and even install a backdoor into your computer system so they can come and go as they please.

To increase your chances of not meeting a Trojan, follow these guidelines.

1. Engagement
Trojans can infect your computer through rogue websites, instant messaging and e-mails with attachments. Do not download anything on your computer if you are sure 100 percent of the sender or source.
2. Make sure your operating system is always up to date. If you use a Microsoft Windows operating system, it is essential.
3. Install reliable anti-virus software. It is also important that you download updates frequently to catch all new Trojan horses, viruses and worms. Make sure the anti-virus program that you can also choose scan e-mails and files downloaded through the Internet.
4. Consider installing a firewall. A firewall is a system that prevents unauthorized use and access to your computer. A firewall will not eliminate the virus from your computer problems, but when used in conjunction with regular updates of the operating system and a reliable anti-virus software, it can provide additional security and protection for your computer.

Nothing can guarantee the security of your computer 100 percent. However, you can continue to improve the security of your computer and reduce the risk of infection by consistently following these guidelines.

posted by neptunus @ 8:12 PM  
0 Comments:

Post a Comment

<< Home

Google

Internet Marketing