What is the Trojan horse?

named for a giant horse, which was supposed to be a gift, but was filled with the Greek army, the Trojan Horse Program can be equally misleading. The story is that the Greeks gave the Trojan horse a huge wooden horse as a peace offer. Citizens Troy received this gift, brought horses to the city, threw the winning bash and then went to bed. Until the fire of Greek soldiers, the city lit the city that they realized they had. The Trojan horse, which affects computers, can also contain ugly surprises. Can damage, delete or destroy important files.

Trojan's horse may actually seem useful application, and therefore so many unsuspecting people will download them. The Trojan horse could be masked as a program designed to deprive your virus computer, but instead it would actually be used to infect your system. While the terms "virus" and "Trojan horse" are often used interchangeably, they are actually quite different. The virus replicates while the Trojan horse is not.

Once the Trojan horse is activated, it can approach files, folders or your entire system. Usually Trojan horses create a "backdoor" or "trapdoor" that can be used to send your personal data to another location. To protect your system from the Trojan horse, extensive antivirus software is a good first step. Choose a program looking for Trojan horses and worms and viruses, and make sure it updates the definitions for each frequently. Also make sure your antivirus e-mail and provides a warning or automatically delete any message that contains a suspicious code, even if the code is not a specific malware that the program has already identified.

The most effective option for protection from the Trojan horse can be the installation of the firewall gate if you do not have it yet. A good software firewall is usually the best type for a personal computer. It can be a naconfigured to prevent intruders from preventing your system or programs ine your system before sending personal or confidential data.

If you are unsure, try the test version of the firewall or download a free view. Start it for one day and explore the protocol file. You will be shocked with a lot of information that goes in and out of the computer in twenty -four hours. You can even detect Trojan or other malware that has reached your antivirus because Trojan horses are often difficult to detect.

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?