Trojans are small computer programs that
install secretly and quietly and
contain malicious payloads. Unlike viruses, they
do not replicate themselves. They actually install as half of a two part
program. The second part is on the Hacker's computer.
After the installation, an attacker
gets almost complete control over your computer through the Remote Access
program that the concealed payload dumped in it.
Trojans frequently appear to do something benign or beneficial. They might
display a pretty animation or appear to be a utility of some sort. They usually
come by e-mail as attached files such as: .avi, .pif, .exe, or sometimes .jpg
Did You Know?
The number of identity-stealing
Trojans has grown from 74 per cent to 80 per cent of all malicious programs in
just one year, according to research from security company Symantec.
How do Trojans get on our computers?
They get there because we put them there, or
allow them to get in. Therefore, it is very important that we exercise caution
in where we obtain software.
Never take software from someone you meet in a chat room. This is the #1
place where people get stuck with Trojans.
Often people are tricked into thinking the program they're getting will do
something for them, like help them play a game. More often than not, they plant
viruses, worms and Trojan Horse programs.
Do Trojans do destructive things?
They do damage to your computer
regardless of whether you are connected to the
Internet or not.
The bottom line is that if a wicked person can get you to run his or her
program, it is no longer your computer. They can
● make it run your printer even
if you don't have a program open,
● make your CD tray open and
close without your help,
● steal passwords,
● change your wallpaper
selection to a pornographic picture,
● examine and make copies of
private information you may have
stored on your computer,
● HiJack your browser.
● use your computer to send out
damaging RATs to other computers
These 5 basis steps can go a long way toward
keeping you out of trouble:
open anyone's personal floppies unless you
scan them first
in your anti-virus program!
● Be fearful of any email messages from
addresses (senders) that you
● Be wary of any programs you download from
forums, chat rooms, etc.
● Don't install bootlegged copies of someone
Keep your anti-virus and anti-spyware programs up
How to remove Trojans parasites from your computer
Usually, it's very difficult to repair the damage they cause, however, there are
some really fine and very effective Programs available to Home and Small
Business computer users to improve online security and minimize Trojan horse
threats. You'll need three.
Many experienced security experts recommend these two to seek out what's already
on your computer. Why two? Because there isn't any single one that will find all
of the spyware pests. These two have very high ratings -
Spybot Search and Destroy and
The third recommended program,
SpywareBlaster is a little bit different. It doesn't scan for and
clean SpyWare, it prevents it from ever being installed to begin with by
● obstructing the installation of ActiveX-based
spyware, adware, browser
hijackers, dialers and other potentially unsafe pests;
● blocking spyware/tracking cookies in the Internet
Mozilla/Firefox web browsers;
● restricting the actions of potentially dangerous
sites in Internet Explorer.
There are other programs, of course. Among them are
cwsshredder which can help identify and remove many variants of
insidious CoolWebSearch browser hijackers.
Is your computer Infected?
Learn how to recognize the symptoms of a virus
Recognize e-mail problems that could be caused by Trojan implanted worms
FREE Scan of your computer for the Sasser and My Doom worms
Follow these links for information,
advice, and protective tools
| To Top
Avoiding Infection | Infected?
& PopUps |
SPAM & Spyware |
Articles & Reports
Virus Removal Tips|
Maintaining your Computer System health is our Goal.
Help Spread the word about our
'Computer Security Awareness Campaign"
|Links to more info on
some popular and
highly respected PC spyware Protection
and Trojan Horse removal programs
Search & Destroy
Get latest News
Take a look at the Security Alert Blog
A Blog (web log) is a quick and easy
way to share timely information (updated news, trends, developments),
answer questions, express your opinions, challenge ours, and exchange views.
No.1 Use of the Internet?
Please take this one minute
Tell us how we can best serve your primary interests
so you can avoid Hacker and
spy ware intruders.
We'll give you a nifty and entertaining Free
eBook on Coping With Your Stresses
as a Thank for your time
is much more than an instruction manual. It is also an education in
developing a safety mindset ... and it is about giving YOU the power to take
back control of your own welfare, security and peace-of-mind, with- out any
Learn about the tools hackers use
● Learn more about spyware and other online dangers
● Learn steps to prevent intrusion
CLICK HERE to
The Hacker's Nightmare "
and to Get Free eCourse
Practical tips & tech- niques you can use right now to keep hackers,
worms and other germs out of your PCand identity thieves out of your life!