Protect Your Computer Against the Trojan Horse
Trojans come in many forms and can perform different actions on your computer or network; including deleting data, copying data, modifying data, blocking data, disrupting computer networks or computers. Trojans are different from viruses and other type of malware because they can’t self-replicate. There are over 20 different varieties of Trojans that are classified by the type of actions they perform on networks and computers.
- Backdoor Trojans when installed on your computer or network give remote access control over to the malicious users. This enables the author of the Trojan to do anything he wishes with your computer. Backdoor Trojans are used to unite a group of infected computers to form a zombie or a botnet network that they control and use for criminal purposes.
- Exploit Trojans will exploit the programs that contain certain codes or data to take advantage of the vulnerabilities within the program applications on your computer.
- Rootkit Trojans will conceal certain activities and objectives on the infected computer or network. This prevents network operations or you from detecting and preventing the malicious program on your network or computer. The Trojan also extends the time the program can run on the infected device.
- Trojan Banker will steal your account data and online banking information, credit card, debit card and e-payment information. Trojan DDoS this Trojan issues a denial of service attack against a web site or web address. The Trojan uses your computer to send multiple requests to the web site address that overwhelm the targeted address. This causes the web address to stop working because of the denial of service attack.
- Trojan Downloader this Trojan downloads and installs the new version of the malware programs to your computer.
- Trojan Dropper this type of Trojan is installed by hackers so they have access to your computer and can install the Trojans that prevent the detection of the malware on your computer.
- Trojan FakeAV this Trojan fakes the activity of your anti-virus program. The Trojan extorts money from the person that is infected claiming they can remove the threat, but actually there is no threat to your computer.
- Trojan Game Thief steals your account information from your online game accounts.
- Trojan, IM will steal your login and password for your instant messenger, email accounts, Skype, and Yahoo Pager.
- Trojan Ransom modifies the data on your computer when it is installed. Your computer will start experiencing problems and stop running correctly.
- Trojan SMS will use your SMS account for sending text messages from your mobile device to premium rate phone numbers that cost you a lot of money when sent.
- Trojan, Spy will spy on you and how you use your computer. They can track your data from the keystrokes on your keyboard.
- Trojan Mailfinder will harvest all your email addresses from your email accounts.
How to protect yourself against Trojans
- You must remain diligent when working on the Internet or your email account. Trojans can infect your computer through roué websites, email attachments, and instant messaging. Never download programs you are uncertain about or download programs from a website you have never visited before.
- Always have the latest patches and security fixes installed on your computer. This is important if you are running any Microsoft programs or operating system.
- You should use paid anti-virus software for your computer. Free anti-virus software can protect your computer but they don’t offer the protection that paid software does. Always keep your antivirus software up to date with the latest virus detection.
- Having a firewall on your computer will help to control the viruses and Trojans on your computer. The firewall doesn’t guard against Trojans from entering into your operation system, but it will give you an added layer of protection when used with your antivirus software.