Receive all updates via Facebook. Just Click the Like Button Below

Join The Community

Search

Thursday 2 August 2012

Trojan Horse




What Is Trojan.............?

                   Trojans are the programs designed by hacker to get  remote access to a targeted computer system .Once a Trojan has been installed on a targeted computer system, hackers may be given remote access to the computer allowing them to perform all kinds of operations.They are not just like viruses,because they are not replicating itself.But it spreads quickly via Internet communication.

Operation Of  Trojans..

1.Watching the user's screen
2.Crashing the computer
3.Keystroke logging (Including usernames and password )
4.Use of the machine as part of a botnet (e.g. to perform  
  automated spamming or to distribute Denial-of-service attacks)
5.Electronic money theft
6.Data theft (e.g. retrieving passwords or credit card
  information)
7.Installation of software, including third-party malwares
8.Downloading or uploading of files on the user's computer
9.Modification or deletion of files
10.Anonymising internet viewing

How To Avoid Trojan Horse Infection ?

1.Don't script,don't try to paste or type some scripts on your web-
  browser.That may gives full access of
  your system to a malicious hacker.

2.Never download files blindly,you have to check that file before you downloading it.www.virustotal.com 
   may help you.

3.Open the files after scanning it using a updated antivirus software,even it comes from your friend.
4.Beware of hidden file extensions,windows usually hides the extension of a file.For an example,smile.jpg
   might really be smile.jpg.exe !.Yes,It may be a executable Trojan.

5.Remember a truth:You are not well protected.