What is a Trojan? How to avoid trojan attack?
A Trojan is not a virus, but its severity and impact are not different from viruses.
Many people still think of a trojan horse as a virus, but the actual trojan and computer virus vary completely, from how it works to how to infect. However, the trojan is also capable of fast infection, destructive ability is similar to viruses, attacking all data on the computer. With the constant technological development, the trojan issue has also increased, hiding under many different covers to harm the user's computer. So what is a trojan and how to prevent it?
- How to remove Trojan, Virus, Worm or Malware?
- What is Malware RAT? Why is it so dangerous?
- Differentiate between malware, virus and Trojan horse
- How to remove OSDSoft DBUpdater.exe trojan
1. What is a Trojan?
The Trojan (or Trojan horse), first of all a malicious program for the computer, is disguised with a seemingly harmless cover to create trust for the user, thereby using and unknowingly infected the trojan computer. , collected all data from 3rd parties for malicious purposes.
The Trojan is taken from the dictionary of the horse of Troia in Greek myth. The content of the legend tells the intelligence of the Greeks who hid countless warriors in the body of a giant wooden horse, making the enemy mistakenly thought it was an objective achievement that helped the Greeks capture the city. easily. This is similar to how a trojan works.
2. How trojan works and spreads
Trojans hide themselves in various forms from songs, software, images, download links, ads and they look safe, legal for users to download to the computer or just click. Then the spyware will quickly enter the computer system, wait for the signal of the person who wants to invade the computer and then to completely control the user's personal data.
Unlike a virus that is directly attacked by antivirus software, trojan attacks under a program or software such as .exe, .com, .scr, .bat, or.pif. A Trojan is a common software and does not spread like viruses on its own.
So, what are the telltale signs when a computer is infected with a trojan?
Some simple types of trojans that invade a computer leave a number of identifying signs to the user, such as:
- The CD-ROM drive automatically opens and closes.
- Strange sign on the computer screen.
- Computer wallpaper is automatically changed.
- The text automatically prints.
- The computer automatically changes the font and other settings.
- Computer mouse error as not displayed, 2 mice confused.
- The Start button is not displayed.
- The chat window is displayed without opening it.
Of course these are just a few identifiers for simple trojans. Trojans are now more sophisticated as they leave no signs, and in many different forms.
- Backdoor: This type of trojan will allow hackers to access the victim's computer system remotely.
- Spyware: Track user actions to steal personal account information.
- Trojan Zombifying: Seize control of your computer to launch a DDoS attack.
- Types of download trojans: malicious software that has infiltrated the computer will continue to download and install other malicious applications.
3. How to prevent trojan infection
There are many different ways to infect trojans such as accessing untrusted websites, via chat applications, files or links attached on mail, via external devices.
- Remove viruses, Trojans on Windows 7 without downloading software
An effective way to prevent trojans is to never open any strange files, links or software, or even emails from addresses you know. The Trojan spreads only when you click directly on the content that contains the spyware. It is best to check in advance with virus scanners or use Virustotal to check.
Always use antivirus or firewall software to protect your computer. Fully update the patches regularly with Windows computers, to avoid taking advantage of those vulnerabilities to infiltrate the computer.
- How to use a firewall in Windows 10
- How to turn on / off Windows Firewall in Windows 7, 8 / 8.1 and Windows 10
- 10 free firewall software worth using
Hope this article was helpful to you!
You should read it
- What is Trojan Dropper?
- Appeared trojan trojan antivirus tool for mobile
- The intense revival of Briz Trojan
- Appeared Trojans spy on businesses
- Again Trojan appeared to attack Mac OS
- Trojans stealing self-destruct appear
- Warning about a new phishing trojan line
- There are many malicious code targeting eBay
- Limiting the spread of Virus, Trojan manually on Windows
- The fake Trojan add-on Trojan is extremely dangerous
- Appeared Trojan Horse virus attacks Mac computers
- How to prevent RAT attacks and take control of PC
Maybe you are interested
There are 3 doors in the world that 'cannot be opened' How to turn on automatic email replies on Gmail How to Survive Without the Internet on Vacation The 'handsets' with a soft GPS function How to store Office 2010 documents automatically to SkyDrive? 6 interactive social networks for your entertainment needs