Main Menu

Our Partners


Authorized Pearson Vue Test Center



TESDA
Live Online Training


Live CCNA Remote lab

Contest

  

CNCTC Articles - Excellence in IT TRAINING

What is Trojan Horse Virus?

by: Ailene B. Misa | 06 Jan, 2010 13:31:40

Article Word Count: | Viewed: times


In my previous article I discussed the overview of computer viruses. I mentioned Trojan as one of the commonly widespread virus. Let us discuss what this virus is and how it infects your computer.

Trojan horse virus sometimes called Trojan is one of the most common malware in a computer. It is malicious software (malware) that is not capable of duplicating itself. Also, it lets the user assume that it is a good program application.

Trojans virus was intended for hacker to access the information of the infected computer system. This virus requires a communication/interaction with its developer to perform its function. Once the virus is already activated in a computer, the hacker can easily access your computers information through remote connection. The limitation of the hackers' access will depend on the development of the Trojan virus.

Trojans mostly attached itself secretly to a useful software program that once executed in the computer system; it will now start infecting other files or programs.
There are also instances that it takes important details of your computer and send that information to the server assigned by its developers.

Once your computer is already infected, you will observed the slow performance of your unit and there will be instances where a window will automatically pop-up on your screen. On the later part, it can cause your computer to crash.

Trojan horse virus can be acquired through the following:
• File sharing or downloading (P2P). You might have a downloaded file or software with Trojans attached to it.
• Website. You might browse a website with an ActiveX control that contains an executable file with Trojans.
• Email attachments. Most of the Trojan developer uses spamming method to dispense the virus to different email users. Once another user open the attachment it will Trojan virus will automatically infects the other computer. There are some instances when this virus will automatically send malicious emails to all your contacts without you knowing it.
• Compilers. Lately, there are some reports telling that compilers attached Trojans during the process of compiling code to become an executable file.
• Messaging. Once your computer is infected, it can create an automatic instant message that can be sent to other chat user without your consent.

As a computer user, you must be responsible in taking good care of your own unit. It is advisable that you will not open any email from an unknown sender. Remember that most of the hackers use spamming to distribute Trojans to different computer users. But then we have no assurance that all the emails that you might receive are free of virus, even those from your friends.

The question now is on how you can avoid the spread of Trojan horse virus. The finest method to avoid this virus from entering and infecting your unit is by installing an anti-virus program to protect your unit from this harm. This program was designed to sense and erase/delete any malware, even stopping them to be installed in your system.

Once a Trojan virus is already installed and infected your computer, you must know how it operates. Honestly, if the Trojans was already accessed by the hacker it will be difficult for you to find-out the infection and harm it caused you. If you feel like your security is critical, I advised that you delete all your data (never make any back-up to avoid the spread of infection), format your hard disk, and re-install all the necessary software. With this, you can totally prevent the spread of Trojan horse virus.


Protected by Copyscape Originality Checker





Other Related Topics..
« Prev item - Next Item »
---------------------------------------------


What do you think?

Leave comment

This item is closed, it's not possible to add new comments to it or to vote on it

Comments

No comments yet. You can be the first!

  
Live Chat Software

Job Openings

Subscribe

Stay Informed Subscribe

Name *

Email *