Category talk:Trojan horses

Trojan viruses named after the classical story of the Trojan horse, as it imitates the technique to infect computing machines. A Trojan will hide within seemingly harmless programs, or will try to trick you into installing it. Trojans viruses are usually deployed by cyber-hackers in orde to gain access to users' systems. After installation, Trojan virus will assist the criminals to spy on you, steal your sensitive data, and to gain backdoor access to your computer. Following actions can include:


 * Blocking data
 * Deleting data
 * Modifying data
 * Copying data
 * Unlike computer viruses and worms, Trojans are not able to self-replicate.
 * Disrupting the performance of computers or computer networks

What does a Trojan Horse Virus look like?

Trojans virus can look like just about anything. The computer game downloaded from a strange website, free MP3 song by that band you secretly like, even an advertisement that appear on your system may ends up with installing something scary on your computer. Few Trojan viruses are specially programmed to trick you into using them. They can use misleading language or try to convince you they are a legitimate app. This kind of installation is known as social engineering, because the criminals designed a situation to make you act against your interest.

Well, precaution is always better than cure. If you will take the precautionary measures seriously then you can easily protect your PC from Trojan and other malwares. You should avoid visiting porn sites, installing free programs from untrusted sites, always scan external drives before using in your system and you should always keep an updated and powerful anti-malware software.