Trojan Virus in My Computer

I was a bit scared yesterday after finding out that my computer had a Trojan Horse. I was running yesterday my weekly anti-virus scanning and found out that there is Trojan Horse in my computer. Isn’t it scary when your computer might crashed or your data and other personal information will be stolen by a certain person whom you do not know called the hacker? I am thankful that I have an anti-virus program in my pc. Tomorrow I will be installing another anti-virus program with firewall in it. Here is an information about Trojan Horse and what damage it might do to your computer.

I also wish to share next time what are the experiences I had before I discover this malware. I mean my experiences while using this computer before knowing that it is infected by this malware. Protect your computer with anti-virus before it is too late.

What is Trojan Horse?

“A Trojan, sometimes referred to as a Trojan horse, is non-self-replicating malware that appears to perform a desirable function for the user but instead facilitates unauthorized access to the user’s computer system. The term is derived from the Trojan Horse story in Greek mythology.

Trojan horses are designed to allow a hacker remote access to a target computer system. Once a Trojan horse has been installed on a target computer system, it is possible for a hacker to access it remotely and perform various operations. The operations that a hacker can perform are limited by user privileges on the target computer system and the design of the Trojan horse.

Purpose and operation

Operations that could be performed by a hacker on a target computer system include:

* Use of the machine as part of a botnet (i.e. to perform spamming or to perform Distributed Denial-of-service (DDoS) attacks)
* Data theft (e.g. passwords, credit card information, etc.)
* Installation of software (including other malware)
* Downloading or uploading of files
* Modification or deletion of files
* Keystroke logging
* Viewing the user’s screen
* Wasting computer storage space
* Crashing the computer

Trojan horses require interaction with a hacker to fulfill their purpose, though the hacker need not be the individual responsible for distributing the Trojan horse. In fact, it is possible for hackers to scan computers on a network using a port scanner in the hope of finding one with a Trojan horse installed, which the hacker can then use to control the target computer.

A trojan differs from a virus in that only a file specifically designed to carry it can do so.
more infos here

Digg!

 
 

Leave a Reply

 

Resources

Hi dear friends and visitors!! thanks for visiting me here!! Have a great and blessed day!!




WANT TO EXCHANGE LINK WITH ME? READ HERE FIRST

Extras

All photographs used on this site, including thumbnails, are the Author's property and are ©copyright. Please do not use our photos without our permission. If you wish to use one of our photos on your personal website or blog, please send us the link to the page where it is being used and the photo must be linked back to this site. We hope that you respect the Authors' request. Thank you for your respect and understanding!

Copyright © 2013 Health, Food and Travel | All Rights Reserved

Blog Design by Simple Blog MakeOver