U3F1ZWV6ZTQ2MjI4NjA4NjU3NTA0X0ZyZWUyOTE2NTAwMzc2ODgyMA==

What are a Trojan horse virus and steps to treat it


Le cheval de troie informatique


What are a Trojan horse virus and steps to treat it


What is a Trojan horse virus?


  • The trojan is a spy program and has other names such as a server or parchment sticker or spy, but the creators of this type of file prefer resonant names and the name Trojan is relative to the Trojan horse, but with different names, it’s a spy program that makes your computer a server for a spy, which means that it can The spy has control of your device as if you were doing it, but taking into account fact that it is only in case you are connected to the Internet or the network and not only that but when he knows that you are on the Internet, otherwise he is helpless.
  • A Trojan virus can be in any way that works to deceive you, it may be in the form of a computer game or an MP3 song that may be loaded from a strange location, even the ads that appear in front of you in a way that arouses your curiosity and interest - this is called social engineering, which cybercriminals design not Suspicious or suspicious - this virus is harmful to your system.
  • Trojan virus is categorized according to the procedure it performs on your device and we will try to mention some of these types to name but not limited to :

Backdoor Trojan virus: 

It is a Trojan virus that is hidden in your device and gives the ability to hackers and cybercriminals to control your device and steal your data and files and delete them too, and this method is often used for criminal purposes.

Trojan-Banker: 

This virus is designed to steal your internet bank account data and your credit card information.

Game Thief: This type steals players' data and information on the Internet.

Trojan spy: 

Trojan spies on the way you use your computer and tracks data that you enter into your device through screenshots or a keyboard, for example.

Trojan Email Collector: 

Mailfinder This type collects and harvests email addresses from your computer.

IM Trojans: 

This program steals your login information as the username and password for instant messaging programs such as Skype, MSN Messenger, and many others.

SMS Trojan: 

It sends text messages from your mobile device to distinct numbers without your knowledge which costs you a lot of money.


As we mentioned, these types are the most common and not the only ones as there are many more and a day on the day a new species emerges. 


How does the Trojan horse reach the device?



1 - It is sent to you by e-mail as an attached file so that you can receive and execute it, and it may not be sent alone, as it may be in other programs or files.


2 - If you are an ACQ program or a chat program, it can send you a file infected with spyware or even a virus.


3 - When you download a program from one of the unreliable sites and it is too much, the program can be infected by a spy file or a virus, and often it is intended.


4 - Another method of downloading is to simply write the code on the device itself in a few minutes because the Trojan horse differs from the virus in that it is only a very small program composed only of several lines.


5 - If your computer is connected to an internal network or to an intranet .. in this case, the spy file can be transferred from any commercial sub-unit.


6 - The file can also be transferred via the Internet via any FTP program


7 - Finally, a Trojan horse can be created by reformatting certain existing programs on a computer, such as macros, which are found in text management programs.


Prevention of Trojans:


- Use a modern antivirus program and constantly update it using a good firewall such as (alarm zone).


- Do not download any free anonymous program, especially if it comes from a personal or suspicious site.


- Avoid opening emails with unknown sources, especially those with attached files.


- Change the security level in the browser so that it is not accepted to download one of these programs. If you do not want to completely prevent these programs, you can accept programs that have the electronic signature of their source.



We hope you have benefited from this topic on the site  ==>  Computer Skills
Comments
No comments
Post a Comment

Post a Comment

NameEmailMessage