What are they and how to get rid of them?
Trojan horses or
Trojans as they are commonly known as,
have established themselves as a terrible
plague that pretends to take our PCs down,
this programs are capable of camouflage
themselves in other programs we are
downloading from some website; once we run
Trojans can infect our systems up to the
point in which our computers are controlled
from an unknown foreign user.
Most of the Trojans have as a
goal to open communication back doors, such
as TCP or UDP ports, others gather personal
information, such as: our
passwords, bank account numbers,
credit card numbers, phone numbers, etc;
some others just have the task of destroying
personal information or the system’s
information, but most of the Trojans are
just in charge of spying and been able of
controlling the victims computers without he
or she been aware of this.
These are the facts that distinguish a
Trojan from a
its goal, because usually Trojans do not
destroy, unless they have this property.
The intrusion way into our
systems is much known for those who have
already been infected by this program, the
Trojan is hosted inside applications in
websites from unknown origins, they could be
images in gif format, music files (mp3, mov,
mav), videos, programs, etc.
Another method of infection
e-mails; when we receive an
e-mail with attachments from some unknown
sender and open them, for been installed in
the PC, the program runs as usual without
been detected by the antivirus software,
because, apparently it is running the
applications we wanted, but what the Trojan
is doing for real, is making our
This is why it is known as a Trojan horse,
because it uses some sort of disguise, similar to the one the
Trojan citizens let inside their forte, decision which led them
By been able of making our PCs vulnerable, intruders can easily
gather information from our computers, others just focus on
performing destructive actions, however, each day intruders
create new techniques and evolve with sophisticated
applications, these Trojans open some backdoors which allow them
to connect our equipment and control it with us been completely
unaware of their presence.
Some precautions I would advise you to take in
order to avoid these types of programs are: every time you open
an attachment, be sure that the sender is from a reliable source
and not an unknown contact, because
via e-mail is one of the most common ways of intrusion
to the systems.
When you configure your e-mail, be sure to deactivate the
automatic gap for attachments, that way you can decide if you
want to open them or not. Some e-mail customers have antivirus
software that scans the attachments before they are opened, or
can be synchronized with the antivirus software that you have
installed in your PC. If your client does not offer this
possibility, maybe it is time to purchase or download another
one that does.
Check your operative system’s patches once in a while, because
new failures are found every day on them, and keep your
antivirus software updated against the new threats that will
come every day.
Last but not least, avoid using
peer to peer programs (P2P),
such as E Mule,
Ares, I Mesh or
G Nutella; because they usually carry Trojans while you are
how to remove a trojan,trojan
e-course on how to remove a trojan horse,how
to find and remove trojans,delete
remover free downloads,how
to eliminate a trojan.