Trojan Horse Removal
How to detect and remove a Trojan horse virus from your networkA Trojan horse is a computer program that performs one function while appearing to perform another. Trojan horses are notorious for their use in installing backdoor programs to allow unauthorized access of a computer system by another program or hacker.
A Trojan horse program may infect a computer by posing as a screensaver because the application runs constantly in the background. Once installed, it can place all sorts of commands, programs and scripts on a computer without the user's knowledge. The most common purposes of malicious Trojan horses are to run downloaders and servers on the end-user's system. They are also used to launch remote denial-of-service attacks.
Trojan horses do not have to be malicious and may be used to install legitimate software and manage computer systems. They are also used in law enforcement for surveillance and computer forensics.
Safeguard a computer network against Trojan horses by:
- Setting up a routine for employees to follow;
- Installing software to seek and destroy Trojans;
- Searching manually for Trojan horses.
Perform general Trojan horse removal by following some basic procedures
Buy Trojan horse detection softwareTrojan horse detection software uses two basic methods to detect Trojan horses. The software may compare suspect code to a signature list that contains the identifying characteristics of known Trojan horses. Trojan remover software also may look for the type of behavior that a Trojan horse frequently exhibits.
Remove specific Trojan horsesA Trojan horse may have to be removed manually if your Trojan horse removal software does not have it in its signature list. While a Trojan horse remover generally has its signature list updated each month, you may need to visit a forum to find a solution to your Trojan horse infection.
- Take some steps that your Trojan horse remover will not be able to perform well. Check the running processes on your computer frequently. Look for processes with unfamiliar names, especially those that seem to be composed of random letters.
- Be alert for prolonged and continuous disk activity when your computer should be idle. While this frequently indicates that you are simply low on disk space, it can also mean that your computer is being used as a server.
Copyright © 2014 Business.com, Inc. All Rights Reserved.