Showing posts with label microsoft. Show all posts
Showing posts with label microsoft. Show all posts

Saturday, April 21, 2007

Not Just a Greek Myth - The Trojan Horse

We have all heard the term "Trojan Horse," but what exactly is it - aside from Greek Myth?

A Trojan Horse is a destructive program that masquerades as a harmless application (Just like Odysseus' harmless 'gift' horse that was accepted into the city of Troy). Unlike viruses, Trojan Horses do not replicate themselves, but they can be just as destructive.

One of the most dangerous examples of a Trojan is a program that promises to rid your computer of viruses - but instead - (the gift) introduces viruses into your computer (the army bursting OUT of the horse in the middle of the night to attack Troy/your computer) .

The Trojan can be engineered as extremely tricky.

Who hasn’t been online and had an advertisement pop up claiming to be able to rid your computer of some nasty virus?

Or - more frightening still - you receive an email that claims to be alerting you to a new virus that can threaten your computer! The sender promises to quickly eradicate, or protect, your computer from viruses if you simply download their "free", attached software into your computer. You may be skeptical but the software looks legitimate and the company sounds reputable.....

So how to you proceed?
...many people proceed by taking the advertisers up on their offer - just in case - and they download the software!

In doing so, a user has just potentially exposed his/herself to a gargantuan headache and a computer system to a sundry list of ailments!

When a Trojan is activated, several things can occur:

Some Trojans are more annoying than malicious.
Some of the less annoying Trojans may choose to change your desktop settings or add silly desktop icons.
More serious, malicious Trojans can erase or overwrite data on your computer, corrupt files, spread other malware (such as viruses), spy on the user of a computer.
Trojan spyware can secretly report data to their makers - like browsing habits, passwords, credit car numbers, bank account details, etc.
Trojans may insert keyloggers to keep track of a user's keystrokes and gain 'the usual information' - passwords and credit card numbers, phish for bank account details (which can be used for criminal activities).
Trojan programs can even install a "backdoor" into your computer system so that the Trojan-maker/expert can come and go into and out of your computer at will and at his or her convenience!

To increase your odds of AVOIDING a Trojan - STOP TALKING TO GREEK PEOPLE AND DON'T ACCEPT GIFTS FROM GREEKS.....

Haha - okay - just joking. There's absolutely no fear to be had with any kind of people EXCEPT those who are designing and distributing Trojan software programs.

Here are some recommended guidelines for avoiding Trojan horse viruses

follow these guidelines. Remain diligent Trojans can infect your computer
#1 - Remain diligent in your use of ANTI-spyware and ANTI-virus softwares that are trusted. If you're using some antivirus programs already that have worked in the past - UPDATE those before you go looking around for the next greatest, latest softward - especially downloadable programs! (Remember - these are often the 'gift' of a virus).

Trojans can infect your computer through rogue websites, instant messaging, and emails that contain attachments.

Do not download anything into your computer unless you are 100 percent sure of its sender or source.

Ensure that your operating system is always up-to-date. If you are running a Microsoft Windows operating system, this is essential.

Install reliable anti-virus software. It is also important that you download any updates frequently to catch all new Trojan Horses, viruses, and worms.

Be sure that the anti-virus program that you choose can also scan e-mails and files downloaded through the internet.

Consider installing a firewall. A firewall is a system that prevents unauthorized use and access to your computer.

*note
A firewall is not going to eliminate your computer virus problems, but when used in conjunction with regular operating system updates and reliable anti-virus software, it can provide additional security and protection for your computer.

Nothing can absolutely guarantee the security of your computer 100 percent, however YOU SHOULD ALWAYS BE THINKING OF HOW TO MAKE IT MORE DIFFICULT FOR A VIRUS TO ENTER YOUR SYSTEM!

You can continue to improve your computer's security and decrease the possibility of infection by consistently following these guidelines, as a minimum measure to protecting yourself and your computer.

Last tip:

If you have previously 'not been interested' or 'haven't had the time' to learn more about PC Security, I recommend that you do whatever it takes to overcome your disinterest and the time-management issues that keep you from learning more about how to keep your computer (and your personal information) safe from malware-distributors, hackers, ID Theives and the like!

Secure Your PC - Bare Basics

Securing Your Computer System Today is more than a necessity! As more people use their computers for everything from online chatting - to online banking, investing and shopping, sheer number of electronic data being passed to and fro is staggering.

While online interactions and money-transfering, product and service orders become regular activities, hackers, attachers and crackers are never without people - and computers - to practice their skills on.

While some may be looking to phish your personal information and identity for resale, others simply just want to use your computer (your computer's resources and internet connection) as a platform for attacking other unknowing targets.

Below are a few easy, cost-effective steps you can take to make your computer more secure.

Always make backup copies of important information and store these in a safe placel - that means - separate from your computer!

Update and patch your operating system, web browser and software frequently.

If you have a Windows operating system, start by going to http://www.windowsupdate.microsoft.com/
and run the update wizard.
This program will help you find the latest patches for your Windows computer.

Also, go to
http://www.officeupdate.microsoft.com/
to locate possible patches for your Office programs.

Install a firewall. Without a good firewall, viruses, worms, Trojans, malware and adware can all easily access your computer from the Internet. Consideration should be given to the benefits and differences between hardware and software based firewall programs.

Review your browser and email settings for optimum security.

Why should you do this?

Active-X and JavaScript are often used by hackers to plant malicious programs into your computers. While cookies are relatively harmless in terms of security concerns, they do still track your movements on the Internet to build a profile of you. As a minimum precautions, set your security setting for the "internet zone" to High, and your "trusted sites zone" to Medium Low.

Install antivirus software and set for automatic updates. This way, you'll receive the most current versions.

Do not open unknown email attachments. It is simply not enough that you may recognize the address from which it originates because many viruses can spread from a familiar address.

Do not run programs from unknown origins.

Also, do not send these types of programs to friends and coworkers!!! They contain funny or amusing stories or jokes, but may also contain a Trojans horse waiting to infect a computer.

Disable hidden filename extensions. By default, the Windows operating system is set to "hide file extensions for known file types". Disable this option so that file extensions display in Windows. Some file extensions will, by default, continue to remain hidden, but you are more likely to see any unusual file extensions that do not belong.

Turn off your computer and disconnect from the network when not using the computer. A hacker can not attack your computer when you are disconnected from the network or the computer is off. Consider making a boot disk on a floppy disk in case your computer is damaged or compromised by a malicious program. Obviously, you need to take this step before you experience a hostile breach of your system.