Friday, 6 April 2012

How Computer can be Infected Trojan Horse?

Trojan horse virus presents itself in the application form or to hide in the application itself. Trojan horses usually do not spread or cause any damage to a user clicks on or activate the program.

Basically a Trojan horse has to be executed in order to work. Most often Trojan horse designed to allow the manufacturer is able to access the infected computer remotely.

Trojan Horse Infection origin

Because Trojan horse virus hidden inside or disguised as an application, they must be obtained from somewhere. Infection is usually acquired through email attachments. Immediately after the attachment is executed (clicked) Trojan infects a computer is active immediately.

Trojans can also be derived from the download software, transfer files, as well as various other ways. Because the Trojan must be enabled, as long as the downloaded file is not touched, the infection will not occur.

It's just that there is some kind of Trojan horse that is able to activate itself automatically so it is considered more dangerous. Make sure the antivirus scan your email before downloading anything from email attachments.

Prevention

An antivirus program is very useful for protecting your computer from all types of viruses. Many of these programs automatically scan email attachments before you open it and notify you of any danger. However, you should still be careful to only download anything from sources that cannot be trusted.

How to Eliminate a Trojan


If you find a Trojan on the computer, you should remove it as soon as possible. The best way to do this is to scan the computer with an antivirus program. Even if you know which files are causing the infection, you should let the antivirus program to scan your entire computer.

If the Trojan has already active, it would be almost impossible to determine how many files or applications that have been infected. Quarantine any file to check the severity of infection, and take the necessary action (restores or delete the file).

To be sure, try to scan the computer again to ensure no remaining Trojan.

1 comments:

  1. [...] among your own customers as well as away defeat your competitors; you must be proficient with internet advertising. You must build your existence experienced with help from [...]

    ReplyDelete