This site was created using |
Trojans |
What is a Trojan? Trojans are another form of virus, this category of virus spreads in the same way as any other virus, but there purpose
is different. A Trojan horse basically acts like at virus but doesn't usually
have a payload, what a Trojan does instead is give access to your computer
system via the internet to hackers, in some cases giving them full control of
your system without your knowledge. What can hackers do when they have control? This depends on what level of control the Trojan gives to the hacker, in extreme cases, they can basically do anything that the administrator can do, access, edit, copy or delete any file they wish, take control of the keyboard or mouse. The main worry really, they can get access to passwords / visa details and other private information or files that can be of value to them. How does it give access to the hacker? Most Trojans open an Internet port called a backdoor; it then can send your i.p. Number to the hacker/s, and then keep the port open and wait for the hacker to log onto your i.p. and take control. How do I check for Trojans? Because Trojans are viruses most will be picked up by a virus killer, please see the section on virus killers. How do I stop Trojans from opening ports? You need a firewall, a firewall puts up a wall between your computer and the internet, only allowing access to the internet/system that you grant permission, please see the section on Internet security. Are there any programs that are designed just to stop Trojans? Yes-Trojan scanners such as Anti-Trojan, a free alternative is Swat It. |
Anti-Spy, Learn about internet security. |