CLICK HERE

Tuesday, January 22, 2008

Definition Of Trojan Horse


What is a Trojan Horse?

Trojan Horse is a program designed to breach the security of a computer system while ostensibly performing some innocuous and malicious function.

Trojan Horse can cause destruction of data, unexpected system behaviour, and trepass the security of systems without your knowledge. However the main difference between the Trojan Horse with the computer virus was that a Trojan Horse inability to replicate itself because it does not infect other programs or data. A Trojan Horse, named from Greek mythology's Trojan Horse, typically comes in good packaging in file but has some hidden malicious intent within its code. When the infection of Trojan Horse occurs, it will put the computers’ user in the way that will likely experience unwanted system problems in operation, or sometimes loss of valuable data; i.e. automatically delete the information from discs, make the system freeze or slower than before, steal personal information, and etc.

Routes Of Infections Of Trojan Horse

The majority of the infections of the Trojan Horse occurs because the user were tricked in to running an infected program. That’s why it was advised not to open a suspicious attachment and email. However, the infections will be directly occurs if the suspicious program sent through the Instant Message i.e. the famous Windows Live Messenger, downloaded from web sites or by USB flash drive ( the physical infections were seldom occurs). Most of the Trojan Horse hidden in the cute animate picture and image and the infections of the Trojan Horse were very rare, the infections often occur through the download.


Method Of Deletion Of The Trojans Horse From Your Computer

Deleting the Trojan Horses From your computer was not a simple way since computers’ user may not conscious about the existing of the Trojan Horse. However, there were several methods to deleting the Trojan Horse. The method was by clearing the temporary internet file regularly, or finding the suspicious file and deletes it by manually. Normally, the antivirus programs can be detect and delete the Trojan Horse automatically. If the antivirus can not do this, just reboot your computer into the safe mode or without networking, then run your antivirus programs to search the unwanted programs again and then the Trojan Horse could be deleted already.

In short, what is more important was the computers’ user should updates the antivirus data regularly to keep their computer from infected by unwanted programs and if there is an infection, the antivirus program can be deleting them.

No comments: