Monday, October 25, 2010

Trojan Horse


Beast
a Trojan Horse program

Many people mistake Trojans as but they often don't spread from computer to computer. Trojans are spread by the user downloading a piece of software that looks legitimate before that install and looks like a legitimate piece of software but instead lets another user access to your computer. Some Trojans may change the user's desktop to display advertisements and some Trojans just install a toolbar in the web browser of the user. Other Trojan Horse infections the computer so person controlling the Trojan software can steal personal information, view the computer screen, download or upload files or log your keystrokes. Hackers don't have to be the person who distributes the virus they can scan a network to see if any computers have the Trojan installed so they can gain access to the computer. Some Trojans can be computer virus by asking a user on an instant messaging network to install the virus. There are Trojans that infect the computer and send messages to instant messenger contacts saying "here is a funny photo of you click on the link to see it" or something similar. Trojan type malware use is becoming more and popular and 83% of all viruses detected are Trojan-type malware. Luckily most times the Trojan infection is detected by anti-virus software before the software is installed so it can't cause any damage. If you suspect you accidently downloaded a Trojan and your anti-virus didn't detect it you should not open the file and have you have your anti-virus do a complete scan of your computer.

No comments:

Post a Comment