It is quite possible to assume that not everyone is able to remember the history of the siege of the city of Troy, but the expression "Trojan horse" has probably been heard by everyone. The real Trojan horse, the one thanks to which Troy fell, was a large wooden horse, perceived by the inhabitants of Troy as a gift, but only the enemy soldiers hidden inside opened the city gates at night, let the army inside and the city fell. Modern Trojans behave in a similar way, only it is not ancient cities that fall victim to the fall, but our computers.
Instructions
Step 1
It is customary today to call a Trojan horse a malicious virus that penetrates a computer, disguising itself as harmless and even useful programs. The user downloads such a program and does not even suspect that hostile functions are spelled out in its code. When the program is launched, the Trojan is introduced into the computer system and begins to create all the disgraceful things for which it was created by the cybercriminals. The consequences of a Trojan infection can be very different - from unnerving, but completely harmless freezes, to transferring your data to fraudsters and causing you serious material damage. The difference between a Trojan and a virus is that the Trojan is not capable of self-copying, which means that each of them was introduced into the system by the user himself. Antiviruses can track Trojan horses, but special programs do a much better job.
Step 2
Moreover, almost all anti-virus vendors offer free utilities for catching Trojans on their websites. Eset NOD, Dr. Web, Kaspersky - any of these vendors can offer the freshest version of the program that can catch your uninvited guests. At the same time, it is very important to use fresh utilities, because the army of Trojans is replenished every day with new, more cunning representatives, and the day before yesterday the program may simply not recognize them. Sometimes it makes sense to download several programs and run the system through them. In addition to utilities produced by antivirus companies, you can also find anti-trojans from less well-known manufacturers on the Internet, but they are no less effective in searching. For example AntiSpyWare, Ad-Aware, SpyBot and many others. If independent attempts to cure the computer do not bring the desired result, then it is better to refer the computer to a specialist who can apply more serious measures.
Step 3
But, as you know, the best treatment is prevention. As mentioned above, Trojans do not materialize out of nowhere; users download them to their computers themselves. This can happen when downloading unknown files, clicking on dubious links, opening files with unknown content in the mail. Cracked programs are especially dangerous in terms of potential infection. 99% of the kernel of such a program will be infected with a Trojan virus; unfortunately, there is no free cheese. Therefore, vigilance and caution - these two qualities will be more reliable than any antivirus. A good antivirus with new databases, regular scanning of your computer with special programs will close the last hole through which a Trojan horse could sneak up on you.