Skip to main content

how trojans work and how to stop a trojan horse


What is a Trojan?

A Trojan Horse is an unauthorized instruction contained within a program that performs functions unknown to (and probably unwanted by) the user. On a personal computer, trojans can be destructive to the system.

Why the name 'Trojan Horse'?

In the 12th century B.C., Greece declared war on the city of Troy. The dispute erupted when the prince of Troy abducted the queen of Sparta and declared that he wanted to make her his wife, which made the Greeks and especially the queen of Sparta quite furious. The Greeks gave chase and engaged Troy in a 10-year war, but unfortunately for them, all of their efforts went down the drain. Troy was simply too well fortified. In a last effort, the Greek army pretended to be retreating, leaving behind a huge wooden horse. The people of Troy saw the horse, and, thinking it was some kind of a present from the Greeks, pulled the horse into their city, without knowing that the finest soldiers of Greece were sitting inside it, since the horse was hollow. Under the cover of night, the soldiers snuck out and opened the gates of the city, and later, together with the rest of the army, killed the entire army of Troy. This is why such a program is called a Trojan horse - it pretends to do something while it does something completely different, or does what it is supposed to be and hides its malicious actions from the user's prying eyes.

What do Trojans Do?

Trojans are notorious for their mischievous behaviour, such as gaining access to your hard drive, putting random nonsensical pop-up message boxes, etcetera.  Some can even gain full control over your computer, log all your keys, and sometimes even interfere with them, upload and download scripts, make a screenshot of your monitor, or sometimes just pop-up a joke on your screen, and so on.

Regardless of their strength, no trojan can ever get away from a smart antivirus scanner. Normally, trojans would usually want to start automatically whenever you boot-up your computer. There are program monitors that will tell you you exactly what processes are running on your computer but some trojans, use fake names and its a little harder to realize that they are infected. Also, some trojans might allow the attacker to download, upload and execute files quickly and easily.

Getting Rid of Trojans

There are basically two separate ways to remove trojans and viruses from your computer. The first one is simple. Research the market well and get yourself a smart and up-to-date anti-malware kit. Then follow up the instruction given by the application creator - which usually comprises of booting up in safe mode, or some sort of recovery mode and scanning the entire system. The second method is verbose where you have to manually identify the possible trojans. Remember that even if you're working on a restricted environment, there is still a risk of the passwords and files.

To prevent trojans from getting into your system in the first place, do not download any files from untrusted sources. Make sure you don't run any unauthorized software, and always keep your system up to date with the latest anti-virus patch.

Comments

Popular posts from this blog

this symbol is called a lemniscate, and other facts

The technical term for your foot "falling asleep" is "taresthesia". "Pins and needles" is really called "paresthesia". Great Britain has invaded about 90% of the world's countries. There's a brand of hand sanitizer called "Maybe You Touched Your Genitals". There was a hoax that the world was ending in 1806 because someone wrote "Christ is coming" on eggs, that were later stuffed into a hen. Gary Numan is actually 13 days older than Gary Oldman. There is a word in the English language with only one vowel, which occurs six times: Indivisibility. Los Angeles's full name is 'El Pueblo de Nuestra la Reina de los Angeles de Porciuncula'. Polyamorous people have invented a word to indicate the opposite feeling of jealousy - compersion. The Macrocilix maia moth confuses predators with wing patterns that mimic two flies eating bird poop. It even releases a pungent odor to drive home the dec

abort, retry, ignore poem

The infamous Abort, Retry, Ignore message box of Windows, with no option given to close it. Found this classic and fun poem about the "Abort, Retry, Ignore" message. I have been able to trace back the source to Annoyances.org. Here it is: Once upon a midnight dreary, fingers cramped and vision bleary, System manuals piled high and wasted paper on the floor, Longing for the warmth of bed sheets, still I sat there doing spreadsheets. Having reached the bottom line I took a floppy from the drawer, I then invoked the SAVE command and waited for the disk to store, Only this and nothing more. Deep into the monitor peering, long I sat there wond'ring, fearing,
 Doubting, while the disk kept churning, turning yet to churn some more.
 But the silence was unbroken, and the stillness gave no token.
 "Save!" I said, "You cursed mother! Save my data from before!"
 One thing did the phosphors answer, only this and nothing more,
 Just, "Abort

an inflating flashbag

This is a flash drive. A flashbag, more accurately. When it is empty, it is slim and as data is filled into it, the bag starts to inflate until it is full. How ingenious! The creators have applied micro- pumps to achieve this, as stated in their site . When the device is about to blow off, it gives a message - "There is not enough free space". At times when it is not plugged in, it remains inflated relative to the amount of data it is holding. There are other innovative products from the creators of flashbag - such as C'ALL future phone , Balloophone , AllTunes , GMEA , Trings and Remobeads . Great, PlusMinus ! Kudos to your grey cells.