Trojans are malicious programs that disguise themselves as useful applications, for example, antivirus updates, utilities, etc. Once it enters a computer, the Trojan monitors the actions performed on the computer, collects information and sends the data to the developer.
According to statistics, most cases of Trojans entering a computer are caused by the users themselves. This often happens after the user has launched a file obtained from an unreliable source, for example, from a suspicious site with free software or from an email from an unknown address. The most common sources of Trojan horses are: - email; - ICQ; - sites with hacked software; - pirated software discs. The danger of a Trojan horse is that it gains almost unlimited access to your computer. Some Trojans are "harmless" - they can swap mouse buttons, slide out the drive tray, open additional folders, etc. But Trojans can also access information entered from the keyboard, so your passwords from e-mail, social networks and other sites can be easily intercepted and sent to the creator of the malware. As a rule, Trojans mask their presence in the system by registering in the registry. Therefore, they will not be listed in the list of running applications. Signs indicating a possible presence of a Trojan horse are frequent freezing of computers, periodic opening and quick closing of some windows, sent messages in e-mail or social networks that you did not send. If one of the described signs takes place, check the system with an antivirus. It will not be superfluous to check the following system registry branches, which are responsible for starting programs when the computer is turned on, for unknown applications: - HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun; - HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun; - HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRunServices; - HKEY_USERS. DEFAULTSoftwareMicrosoftWindowsCurrentVersionRun.