albtechportal

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Thursday, 27 June 2013

Trojan Detection

Posted on 08:20 by Unknown

What is a Trojan?

A Trojan is small, malicious programme that is installed along with a more attractive one. For example, that great freeware programme you got from that dodgy website? It may well be the programme you wanted. But someone (usually a 3rd party) may well have attached a Trojan to it. The Trojan will be installed as well as the software you wanted.
Trojans are not viruses, in the sense that they don't replicate or send copies of themselves to others. They are just another programme that can be installed on your computer, albeit a nasty one!


What do Trojans do?

A Trojan can be very malicious indeed. Most of them are intent on controlling your PC. These are called Remote Access Trojans, or RATs for short. If someone has placed a Trojan on your computer, they'll be able to see everything that you can. Some of them can even controll your webcam. That means the attacker can see you! If you have speakers attached to the PC, they can even hear you!
If that weren't bad enough, the attacker will have access to your computer, enabling him to upload nasty things to your PC. After all, why should he store these things on his computer when he has access to yours?
Most Trojans these days, though, are placed on your computer by criminals. If you type your credit card details in to a website, for example, then the attacker can record what you type. If a criminal has controll of a lot of computer, he could also launch something called a Denial of Service attack. A DoS attack is when a lot of malicious computers attack a particular network or website. The network has so many request that it can't cope, so has to shut down. The criminals then blackmail the owner ("We'll let you have your site back if you give us money".) Many gambling sites have been hit by this type of attack.
A Trojan can also disable your security software, leaving you wide open on the internet.

How do trojans get on My Computer?

If you have an unpatched version of a Windows operating sytem (XP, ME, W98, etc) that is allowed on the internet then you have a very high chance of becoming infected. Install Service pack 2 as matter of urgency. And get all the other Windows updates. If you browse using Internet Explorer then be aware that it is notorius for being unsecure. (At one stage, it was known as the Swiss Cheese browser because it had so many holes in it!) even with all the latest patches, someone is always trying to find a new hole in Internet Explorer. If an attacker can guide you to a particular website, then your browser's security holes can be a way for them to load programmes onto your PC. A lot of people have switched to using a browser other than Internet Explorer, the most popular choice being Firefox.
But Trojans can get on to your PC many other ways: email attachments, software/music downloads, unsafe Instant Mesaage clients, IRC, Peer 2 peer downloads, open ports not protected by a firewall - the list is long!


If I have Anti-Virus software, does that mean I am protected?

You are not necassirly protected from Trojans, just because you have Anti-Virus software on your computer. If you have Norton or Mcafee please remember this: Most popular does NOT mean best! (See our Anti-Virus section for more details.) The problem faced by the makers of Anti-Virus software is that Trojans are easily adapted, and new versions come out all the time. Anti-Virus software makers are constantly playing catch-up. That's why it's important to update your Anti-Virus software on a regular basis. Besides, a really good trojan can disable your Anti-Virus.

How Can I Protect Myself?

The best defense against Trojans is a dedicated Trojan scanner. There is a free online Trojan scan you can do here:
Free Trojan Scanner
Consider buying separate software just for Trojan protection. Not only will these detect the latest threat, but they will also rid your computer of any infection.
Trojans can be far more harmful than viruses, so it's well worth getting the right tool for the job. Don't skimp in this area!
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Security | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Review: Seagate 600 480GB SSD
    Seagate Joins the Fray It’s been quite an interesting turn of events over the past couple years in the storage industry. Whereas practical...
  • Top 10 Ways to Customize Your Desktop
    1 Expand You spend a lot of waking hours at your computer, so why not make it a little prettier (and more productive)? Here are 10 ways to...
  • CCBoot - LAN Boot Software for Windows
    LAN Boot Solution Background LAN boot is a technology based on IP (Internet Protocol), UDP (User Datagram Protocol), DHCP (Dynamic ...
  • ‘Strata’ for iOS and Android game review
    There are games that are fun. There are games that look great. And then there are games that do both. Strata is one such game that h...
  • Adobe Photoshop CS6 Extended 13.0 & Plugins + Textures
    Adobe Photoshop CS6 Extended 13.0 & Plugins + Textures | 3.5 GB Adobe Photoshop CS6 Extended software delivers even more imaging magi...
  • Intel NUC DC53427RKE / HYE Review
    Manufacturer: Intel UK Price (as reviewed): £308.32 (inc VAT) US Price (as reviewed): $539.99 (ex TAX) Preferred Partner Price: £308.32...
  • ASUS R9 270X DirectCU II TOP 2 GB
    AMD's new Radeon R9 270X draws its lineage more from the Radeon HD 7800 series than any other. The R9 270X is, for all intents and purp...
  • Corsair Raptor M40 Review
    Manufacturer: Corsair UK price (as reviewed): £44.99 (inc VAT) US price (as reviewed): $59.99 (ex Tax) Along with the Raptor M30, Corsai...
  • Call of Duty: Ghosts Review
    Developer: Infinity Ward Publisher: Activision Platforms: PC, X360, PS3, PS4, Xbox One Price: £39.99 Reviewing a Call of Duty game is a ...
  • How to remotely install apps on your smartphone
    You can download and install apps to your iPhone and Android phone without being anywhere near it. That sorcery is this? It isn't sorce...

Categories

  • Android
  • Apple
  • Audio
  • Blogger
  • C/C++
  • Cabling
  • Cameras
  • Cases
  • CISCO
  • Cooling
  • CPU
  • Desktop
  • DNS
  • Ebook
  • Fiber Optic
  • Gadgets
  • Game
  • Google
  • Graphic Card
  • Hardware
  • HDD
  • HTC
  • HTMLCSS
  • Hyper-V
  • Intel
  • iOS
  • iPad
  • Iphone
  • IT
  • jQuery
  • Laptop
  • Linux
  • Mac
  • MacTut
  • Microsoft
  • Mobile
  • Mouse
  • Networking
  • News
  • Nexus
  • Nokia
  • Nvidia
  • OS
  • PERIPHERALS & COMPONENTS
  • Photoshop
  • Printers
  • Programming
  • Projectors
  • PS4
  • Ram
  • RedHat
  • Review
  • Samsung
  • Scanners
  • Seagate
  • Security
  • Server2008
  • Server2012
  • Servers
  • Smartphone
  • Software
  • Sony
  • Storage
  • Tablets
  • TechNews
  • Template
  • Tutorials
  • TV
  • Ubuntu
  • Voip
  • Webdesign
  • Webiste
  • WebServer
  • Win7
  • Win8
  • Windows Phone
  • Wordpress
  • Workstation
  • XBOX

Blog Archive

  • ▼  2013 (495)
    • ►  December (35)
    • ►  November (332)
    • ►  October (12)
    • ►  September (27)
    • ►  August (2)
    • ►  July (10)
    • ▼  June (42)
      • Six Predictions for Cloud Collaboration in 2013
      • Understanding VLAN Trunk Protocol (VTP)
      • Creating a Mail Server on Ubuntu (Postfix, Courier...
      • Voice Over Internet Protocol (VoIP)
      • Advantages and disadvantages of computers
      • How to make Ubuntu bootable USB
      • Networking Tutorials
      • Why you need a Firewall
      • Online Banking - Essential Security Measures
      • Secure Your PC All about SpyWare
      • Trojan Detection
      • Installing and Testing Wampserver
      • Web Server Tutorial
      • With IE11, Microsoft gets all touchy-feely
      • How to Allow Users to Subscribe to Categories in W...
      • Install Graphical user interface (GUI) in Ubuntu 1...
      • 10 Hand-Picked Tutorials for Beginning Web Designers
      • The Sideswipe Home Screen
      • Top 10 Computer Tricks Every Geek Should Know
      • iPhone 5 tips and tricks
      • Samsung Galaxy S4 Mini review
      • What Is Network Security?
      • Packet-switching
      • Routers and Switches
      • Mixed Networks
      • Fully Switched Networks
      • The Problem: Traffic & Solution
      • Network Topologies
      • How LAN Switches Work
      • Networking Basics: What You Need To Know
      • Sony Xperia Tablet Z Review: Sony Gets It (Mostly)...
      • iOS 7 and its 10 Best Features Explained
      • Xbox One Pricing and Availability Announced
      • How to print directly from the Android phone
      • Choosing a Gaming CPU at 1440p: Adding in Haswell
      • Samsung Makes Galaxy S 4 Active Official - IP67 an...
      • How to set up VPNing on Windows 8
      • How to Change DNS to google public DNS
      • Photoshop Tips: The Brush Tool
      • HTML5 Slider Tutorial Javascript Function Programming
      • Apple Fixes Serious Flaws You Didn't Know About in...
      • Choosing a Gaming CPU
    • ►  May (35)
Powered by Blogger.

About Me

Unknown
View my complete profile