Article Categories
» Arts & Entertainment
» Automotive
» Business
» Careers & Jobs
» Education & Reference
» Finance
» Food & Drink
» Health & Fitness
» Home & Family
» Internet & Online Businesses
» Miscellaneous
» Self Improvement
» Shopping
» Society & News
» Sports & Recreation
» Technology
» Travel & Leisure
» Writing & Speaking

  Listed Article

  Category: Articles » Technology » Computers » Article
 

Crouching Trojan, Hidden Malware




By Joel Walsh

Trojans are not just more dangerous than computer viruses, they're stealthier, too. Find out where they hide.

Minions of an evil master lurk in your hard drive, crouching in your system registry, ready to pounce.

What Is a Trojan?

The word "Trojan" is a mystery to most people, even many who think they know its true meaning. If more people really understood what Trojans are and the risk they pose, there would be fewer Trojans, since fewer people would ever leave their machines vulnerable to them.

A Trojan is malware. Malware is a special kind of software, like spyware, adware, and viruses that no one wants. Yet a Trojan is more dangerous than any other kind of malware. Unlike those other types of malware, Trojans are not mindless flunkies hurled at your computer by their masters. A Trojan is a master that first craftily infiltrates your PC, then unleashes its malware henchman.

What Trojans Do

• Some Trojans may install worms, which are programs that use your computer and internet connection to send out armies of server requests in the hope of shutting a particular website down, or to spread viruses or worms to other computers.

• Other Trojans are thieves, out to steal your computer's processing power and turn it over to their hacker masters, often by setting up a backdoor, a hidden internet connection that allows for outside manipulation of your machine.

• Some thieving Trojans are fraudsters that may go after your financial information by installing keyloggers that record what you type--especially passwords and important banking numbers.

How Do Trojans Hide?

No one thinks they have a Trojan on their computer until it is too late. That's because they do such a good job of blending in.

• Trojans come disguised in innocuous file names, often pretending to be a helper application to software or an essential operating system component.

• Trojans try to avoid calling attention to themselves, and so will often only interfere a little, if at all, with your computer's performance, choosing instead to do their dirty work while your machine is idle. Computers left on and connected to the internet while their owners are asleep or at work or school are favorite targets.

How Do You Remove Trojans?

Removing Trojans can be a can of worms. Here's why you need to proceed with caution:

• Since Trojans can disguise themselves as software your computer actually needs, you could accidentally delete a vital program or system registry entry. In the worst case scenario, you won't be able to restart your computer.

• Many Trojans are trained for survival. When you try to removal them manually, they may simply copy themselves to another directory.

Intimidated? You don't have to be. Rather than trying to defuse a Trojan yourself, why not call in the bomb squad? Good anti-spyware and antivirus software will fight Trojans, too. Just make sure to look for a program that specifically says it fights Trojans. After all, this is no job for amateurs.
 
 
About the Author
Joel Walsh writes for http://www.spyware-refuge.com about spyware removal: http://www.spyware-refuge.com/spyware-removal.html? spyware removal [Publish this article on your website! Requirement: live link for above URL/web address w/ link text/anchor text: "spyware removal" OR leave this bracketed message intact.]

Article Source: http://www.simplysearch4it.com/article/8793.html
 
If you wish to add the above article to your website or newsletters then please include the "Article Source: http://www.simplysearch4it.com/article/8793.html" as shown above and make it hyperlinked.



  Some other articles by Joel Walsh
Comparison Shopping on Your Cell Phone
How often do you find something at a store and wonder how much cheaper you could get it online? Now you don't have to wonder--you can call 1-888-FRU-SHOP. That's the number for Frucall, ...

Residential Property Flipping and Real Estate Today
The twenty-first century has given real estate a whole bunch of new household words, from ARM to interest-only mortgage (OK, that's three words, but you get the idea). Increasingly, one ...

Used Auto Warranty Warning: Beware Dealer-Issued Extended Auto Warranty Coverage
Buying a used car? You need an extended auto warranty to protect you from expensive surprises down the road. But be careful ...

Credit Card Merchant Service: Easy, Cheap and Necessary
Your online business needs to accept credit cards. That's true whether your business is the next ebay or you're just selling your old collectibles on ebay. You're ...

SEO Outbound Link Relevance
You know search engines evaluate a site based primarily on the links going to it (inbound links). The PageRank of the sites on which the inbound links are located, and the anchor text of the ...

VOIP Small Business/Home Business Advantage
Small businesses, home-based businesses, and self-employed individuals have been turning to internet telephone service (also called broadband phone or VOIP) in droves. What is the attraction? As a self-employed, telecommuting, small-business-owning freelance writer, I can provide ...

  
  Recent Articles
Microsoft Word. The power is under the hood
by Robert Duval

How To Select The Best Gaming Laptops
by Tim Childree

How To Select The Best Business Laptops
by Tim Childree

High-Tech Computer Rental for Business Promotion
by Michael Braganza

Managing a Worldwide Print Infrastructure from a Single Workstation in a Central Location
by Rick Ferguson

A Sneak Peek Into The World Of Refurbished Laptops
by Javier Fuller

Battery information
by goodbattery

Tell Me About Computers
by Khal Nuwar

Setting Up Your Own Internet Radio Station
by Jason Cole

Understanding Solar Energy
by Anna Stone

Mac FAXstf X Pro Faxing Program for Mac OS X Users
by Nivea David

How to Retrofit a Picture or an Image into Desktop Wallpaper for Your Computer
by Steve Dimeck

Can't connect to database