Because When A Hacker successfully puts a Trojan Horse in your computer,
     it's no longer yours, the Hacker gains access to all of your files and secrets.

                         "What's a Trojan Horse?"

           A large portion of the mischief and malice done to personal computers across the Internet is
                     performed through 'RATS', which are Remote Access Trojan programs.


   

Trojans are small computer programs that install secretly and quietly and contain  malicious payloads. Unlike viruses, they do not replicate themselves. They actually install as half of a two part program. The second part is on the Hacker's computer.

After the installation, an attacker gets almost complete control over your computer through the Remote Access program that the concealed payload dumped in it.

Trojans frequently appear to do something benign or beneficial. They might display a pretty animation or appear to be a utility of some sort. They usually come by e-mail as attached files such as: .avi, .pif, .exe, or sometimes .jpg

 

Trojan Horses can conceal very dangerous payloads.

 

 

 Did You Know? The number of identity-stealing Trojans has grown from 74 per cent to 80 per cent of all malicious programs in just one year, according to research from security company Symantec.

                         How do Trojans get on our computers?
 
They get there because we put them there, or allow them to get in. Therefore, it is very important that we exercise caution in where we obtain software.

Never take software from someone you meet in a chat room.  This is the #1 place where people get stuck with Trojans.


Often people are tricked into thinking the program they're getting will do something for them, like help them play a game. More often than not, they plant viruses, worms and Trojan Horse  programs.

                      Do Trojans do destructive things?
 
They do damage to your computer
regardless of whether you are connected to the Internet or not. The bottom line is that if a wicked person can get you to run his or her program, it is no longer your computer. They can

    make it run your printer even if you don't have a program open,
    make your CD tray open and close without your help,
    steal passwords,
    change your wallpaper selection to a pornographic picture,
    examine and make copies of private information you may have
       stored on your computer,
    HiJack your browser. 
    use your computer to send out damaging  RATs to other computers


These 5 basis steps can go a long way toward keeping you out of trouble:

      Never, ever open anyone's personal floppies unless you scan them first
        in your anti-virus program!
 
      Be fearful of any email messages from addresses (senders) that you
       don't recognize.
  
      Be wary of any programs you download from forums, chat rooms, etc.
 
      Don't install bootlegged copies of someone else's software.
 
    
Keep your anti-virus and anti-spyware programs up to date.

 
        How to remove Trojans parasites from your computer
 
Usually, it's very difficult to repair the damage they cause, however, there are some really fine and very effective Programs available to Home and Small
Business computer users to improve online security and minimize Trojan horse threats. You'll need three.

Many experienced security experts recommend these two to seek out what's already on your computer. Why two? Because there isn't any single one that will find all of the spyware pests. These two have very high ratings -

               Spybot Search and Destroy   and    AdAwareSE

The third recommended program, SpywareBlaster is a little bit different. It doesn't scan for and clean SpyWare, it prevents it from ever being installed to begin with by
 
obstructing the installation of ActiveX-based spyware, adware, browser
   hijackers, dialers and other potentially unsafe pests;
 
blocking spyware/tracking cookies in the Internet Explorer and   
    Mozilla/Firefox web browsers;
 
restricting the actions of potentially dangerous sites in Internet Explorer.
 
There are other programs, of course. Among them are HijackThis and
cwsshredder which can help identify and remove many variants of the
insidious CoolWebSearch browser hijackers. 
 
                        
                          
NEXT Is your computer Infected?

 
          Learn how to recognize the symptoms of a virus
          Recognize e-mail problems that could be caused by Trojan implanted worms
          Get a FREE Scan of your computer for the Sasser and My Doom worms

Google
Web www.firewalls-and-virus-protection.com

            Follow these links for information, advice, and protective tools
   
| To Top | Avoiding Infection | Infected? | Recovery |Glossary |
    |
Virus Hoaxes |
Cookies & PopUps | Popups | SPAM & Spyware |
    |
Identity Theft | Keyloggers | Articles & Reports | HOME/Firewalls|
    | Site Map |
Survey
| Trojan Horse | Blog |
Virus Removal Tips|

                   Maintaining your Computer System health is our Goal.
Help Spread the word about our 'Computer Security Awareness Campaign"                                     
                                             
                                             
     Close Window

   
Security Programs
Links to more info on some popular and highly respected PC spyware   Protection and Trojan Horse  removal programs
SpyBot Search &  Destroy
AdAware SE
Spyware Blaster
cws Shredder
HijackThis

Get latest News
 Take a look at the
Security Alert Blog
 
HERE.

A Blog (web log) is a quick and easy way to share timely information (updated news, trends, developments), answer questions, express your opinions, challenge ours, and exchange views.

What's your No.1 Use of the Internet?
Please take this one minute Mini-Survey.
Tell us how we can best serve your primary interests
so you can avoid Hacker and spy ware intruders.
We'll give you a nifty and entertaining Free eBook on Coping With Your Stresses

as a Thank for your time

      The Hacker's
       Nightmare™
is much more than an instruction manual. It is also an education in developing a safety mindset ... and it is about giving YOU the power to take back control of your own welfare, security and peace-of-mind, with- out any significant expense.



      
 

  Learn about the tools hackers use
 
Learn more about spyware and other online dangers
 ● Learn steps to prevent intrusion

 
CLICK HERE to Learn about The Hacker's Nightmare ™"
and to Get Free eCourse
       COMPUTER &
  INTERNET SECURITY
  SECRETS REVEALED
Practical tips & tech- niques you can use right now to keep hackers, worms and other germs out of your PC—and identity thieves out of your life!
   
_________________

 | Home | Contact | Privacy Policy | Trojan Horse Copyright © RichardPresents.com. All rights reserved