Saturday 2 March 2013

How to Eliminate Trojan Horses

Trojan horses and eliminate free practical guide:

Trojan horses or better known as Trojans, after the mythical wooden horse devised by Odysseus to make it look like a gift to the Trojans but in reality, within several enemies he hid ...

These programs Computer viruses are called as bad as these do not serve to damage the PC, but simply to disable certain components of the computer , such as disabling the antivirus, firewall, software in general, some system updates and certain websites.

But his biggest goal is to spy and even manipulate the system, this is based on the victim to connect to the server, then this program gains access to TCP or UDP, then there can gather information on the team and eventually be brought its destination.

The Trojans, as illustrated above with the Trojan horse, appear before the victim as something useful and try to achieve in order to open the login.

These are different ways to get to our PC, such as:

    By email , attachments can stay in and applying for download. Generally these messages come from unknown senders as certain Trojans to have infected the computer in the family, this unknowingly sends infected messages.

These files are hidden in images, Excel spreadsheets or Word, winrar or winzip files, etc. As one is familiar with them, and it becomes easy to identify some trojans, for example, the file name is generated automatically so often have strange names, the file size is very small

    · For instant messaging as the Messenger, it appears in the chat window, images for download and they usually have a title unreadable and above all very enticing to open it.
    · When using P2P (Ares, eMule, Kazaa, Limewire, etc.), these are used to download music, videos, documents, keygens and serial utility to download and run the risk of infecting your computer.
    · We can also run into these when we entered untrusted pages, like porn sites or chat erotic. Or when we automatically directed to these pages.

The best defense against these bugs is prevention is better not to open a file but know the sender, but if we are sure that the attachment is safe origin, the title and the body of the message is everyday to our actions, then we can open it without fear.

There are emails like Hotmail, yahoo, gmail, preventing the display of Spam or we download attachments, which does not happen as Microsoft Outlook.

Delete temporary Internet clean bizarre records in task manager or using regedit.

Using "netstat" putting Run CMD can see if any IP is connected to your computer, it is possible that someone is operating from a different computer on your computer.

Try to update the operating system and antivirus, firewall usage is important to limit and control access to the ports that the system is open.

Aside from having a virus, you should have a program specializing in anti-malware, anti-spyware or record cleaners to clear certain bugs that could operate as such.

0 comments:

Post a Comment