Saturday, April 21, 2007

Not Just a Greek Myth - The Trojan Horse

We have all heard the term "Trojan Horse," but what exactly is it - aside from Greek Myth?

A Trojan Horse is a destructive program that masquerades as a harmless application (Just like Odysseus' harmless 'gift' horse that was accepted into the city of Troy). Unlike viruses, Trojan Horses do not replicate themselves, but they can be just as destructive.

One of the most dangerous examples of a Trojan is a program that promises to rid your computer of viruses - but instead - (the gift) introduces viruses into your computer (the army bursting OUT of the horse in the middle of the night to attack Troy/your computer) .

The Trojan can be engineered as extremely tricky.

Who hasn’t been online and had an advertisement pop up claiming to be able to rid your computer of some nasty virus?

Or - more frightening still - you receive an email that claims to be alerting you to a new virus that can threaten your computer! The sender promises to quickly eradicate, or protect, your computer from viruses if you simply download their "free", attached software into your computer. You may be skeptical but the software looks legitimate and the company sounds reputable.....

So how to you proceed?
...many people proceed by taking the advertisers up on their offer - just in case - and they download the software!

In doing so, a user has just potentially exposed his/herself to a gargantuan headache and a computer system to a sundry list of ailments!

When a Trojan is activated, several things can occur:

Some Trojans are more annoying than malicious.
Some of the less annoying Trojans may choose to change your desktop settings or add silly desktop icons.
More serious, malicious Trojans can erase or overwrite data on your computer, corrupt files, spread other malware (such as viruses), spy on the user of a computer.
Trojan spyware can secretly report data to their makers - like browsing habits, passwords, credit car numbers, bank account details, etc.
Trojans may insert keyloggers to keep track of a user's keystrokes and gain 'the usual information' - passwords and credit card numbers, phish for bank account details (which can be used for criminal activities).
Trojan programs can even install a "backdoor" into your computer system so that the Trojan-maker/expert can come and go into and out of your computer at will and at his or her convenience!

To increase your odds of AVOIDING a Trojan - STOP TALKING TO GREEK PEOPLE AND DON'T ACCEPT GIFTS FROM GREEKS.....

Haha - okay - just joking. There's absolutely no fear to be had with any kind of people EXCEPT those who are designing and distributing Trojan software programs.

Here are some recommended guidelines for avoiding Trojan horse viruses

follow these guidelines. Remain diligent Trojans can infect your computer
#1 - Remain diligent in your use of ANTI-spyware and ANTI-virus softwares that are trusted. If you're using some antivirus programs already that have worked in the past - UPDATE those before you go looking around for the next greatest, latest softward - especially downloadable programs! (Remember - these are often the 'gift' of a virus).

Trojans can infect your computer through rogue websites, instant messaging, and emails that contain attachments.

Do not download anything into your computer unless you are 100 percent sure of its sender or source.

Ensure that your operating system is always up-to-date. If you are running a Microsoft Windows operating system, this is essential.

Install reliable anti-virus software. It is also important that you download any updates frequently to catch all new Trojan Horses, viruses, and worms.

Be sure that the anti-virus program that you choose can also scan e-mails and files downloaded through the internet.

Consider installing a firewall. A firewall is a system that prevents unauthorized use and access to your computer.

*note
A firewall is not going to eliminate your computer virus problems, but when used in conjunction with regular operating system updates and reliable anti-virus software, it can provide additional security and protection for your computer.

Nothing can absolutely guarantee the security of your computer 100 percent, however YOU SHOULD ALWAYS BE THINKING OF HOW TO MAKE IT MORE DIFFICULT FOR A VIRUS TO ENTER YOUR SYSTEM!

You can continue to improve your computer's security and decrease the possibility of infection by consistently following these guidelines, as a minimum measure to protecting yourself and your computer.

Last tip:

If you have previously 'not been interested' or 'haven't had the time' to learn more about PC Security, I recommend that you do whatever it takes to overcome your disinterest and the time-management issues that keep you from learning more about how to keep your computer (and your personal information) safe from malware-distributors, hackers, ID Theives and the like!

No comments: