Saturday, July 18, 2009

Trojan Roots

Here's my thought about Trojan Roots.

Last year my computer was one of the first order by a new Trojan horse virus. We visited the website or something wrong with the Trojan virus embedded in them. We almost lost our computers and everything in it. Thank God our computer back every night. The Trojan virus was so new that our anti-virus security do not know how to control them. We have been in contact with people who produce our anti-virus and security software that deals with the daily updates. We gave them access and control over our computer. They managed to block the virus, stop the computer from which any further.

They immediately send an update that is limited to stop this virus from infecting other computers with their virus protection. They let us know that our computer may be infected for a while ', but was contained and would not be able to do more damage. Once you find a way to kill the virus, it sends an update and that would clean our system.

The Trojans struck us was designed to damage our computers. It 'been programmed to destroy data. There are other types of trojan. Some are programmed so that one third of remote access to your computer. This is a remote administration trojan. This may be to see your data, or just to fight with him. It is often used to steal passwords for the victim or the registry. In addition to upload, download, run files, and more. Scary thought is that actually turn a web cam and see what to do, every time.

A Downloader / Dropper is that meaning and purpose is to download another program on your computer.

The remote administration usually a Trojan horse program is to download to your computer. A server of Trojan creates a file server on the victim's computer. This allows the hacker to upload or download files. A Trojan server is often used to load a remote administration trojan, take control of your computer to hackers. Another type of Trojans used to do this, which is a security software to disable it. You can use the hackers in the past, your security, usually with the intention of creating a program for remote administration.

This is a unique type of trojan around. The aim is not to destroy data or control on your computer to secure your data. No, it is gaining control of your computer, and many others, so that at a certain time when all add third computer. This was done to yahoo.com is that not long ago.

No comments:

Post a Comment

Bookmark and Share

Sponsor Links

How To Make Money Removing Viruses And Spyware - Using Totally Free Software.
How Would You Like To Learn The Simple Methods
You can use this information to start a high-paying business.
www.extragoodlife.com

You Will Make Money. We Guarantee It!
uge demand with almost no competition! Start part time with little or no out of pocket expense!
Ready to join the upper class? Buy a nice house and have all the fun toys? Are you willing to work for it?
www.pappapc.com

Computer Secrets Unleashed 2009!
JUST RELEASED - ALL NEW & EXPANDED 2009 VERSION!!
Top Information Technology Consultant spills the beans and reveals his secret techniques...
www.computer-secrets-unleashed.com