Trojan Horse (Trojan horse), referred to as Trojan (horse), its name taken from the Greek deepen the Trojans to remember. Trojan is a more popular virus file. It and other computer viruses, it does not replicate, it will not be able to go to infect other files.
It is used to control another computer through a specific program. It opens the door for the hacker to hosts, without touching by unauthorized access to the affected computer controller, so that hackers can arbitrarily destroy, steal the user’s files, and even remote control of the user’s host.
Its characteristics are disguised as a practical tool / game, to attract users to install it on a computer or server. Trojans Lake City, although not regarded as a virus, but can the latest viruses, exploits together. Trojan Horse Virus of serious harm to the safe operation of modern networks.
In a Trojan Horse computer because resources are occupied, slow down the speed of the host, inexplicable crashes, it may cause the user information is theft, data leakage, change, or delete data, change the computer’s registry, download malicious third-party software, etc. happen.
The following are some of the famous Trojan Horses:
There are different types of Trojans, including sabotage, password send type, remote access type, keyloggers, Trojans, DoS attacks Trojan, Trojan proxy, FTP Trojan, FTP Trojan, a program killer Trojans, Trojans rebound port type and so on.
“Destructive Trojan: The only function is to destroy and delete files on your computer, such as DDL, INI, EXE files.
“Password send type: find the hidden password files and send them to hackers developed mailbox.
“Remote Access Type: just need someone to run the server program, if customers know the IP address of the server, then you can remotely control, monitor victim operation.
“Keylogger Trojans: It records the victim’s keyboard percussion and find the password in the log file. They have the option of online and offline records keystrokes are recorded under your online and offline is the key situation. This means that you press the key to what they know.
“DoS attacks Trojans: When a machine kind of DoS attacks Trojans, then the future this machine will be your right-hand man of DoS attacks. The more the number of machines you control, your chances of success launched DoS attacks will be. Since this attack can be used to attack a computer another station, so the network to find a very great harm and loss.
“Proxy Trojans: through a proxy Trojan, an attacker can use Telnet, IRC and other procedures on condition of anonymity, and thereby conceal themselves trail.
“FTP Trojan: Trojan horse is probably the most straightforward. Its function is to open 21 ports, waiting for the user to connect. The new FTP Trojans also added a password feature, so that only the attacker to know the real password, enter the other computer.
“Killer Trojan program: Trojan This function is turned off running on the other machine side Trojan horse software, allowing the Trojans to play a role.
“Gaming Trojans: This Trojan usually record the user’s keyboard input to steal user information
“Internet banking Trojan: its purpose is to steal the user’s card number, password, or security certificate. Its gaming Trojans hazard ratio more direct victim more heavy losses.
“Downloading categories: its function is to download other malicious programs from the Internet or install adware. This Trojan is easy to spread, fast.
How to remove Trojans?
Here are some steps that you can refer to in order to remove trojan virus:
“Download anti-malware: If you have not installed any anti-malware programs, download and install it now. There are many anti-malware programs on the market, Comodo is a good choice.
“Stop System Restore feature: If you forgot to set, then it will restore your deleted files
“Restart your computer: When you restart, press the F8 key, and then select” Safe Mode “to start your computer.
“Open the Control Panel and select Add or Remove Programs: Trojans usually installed without your authorization program, delete / uninstall you are not familiar with the program.
“Remove the extension: To completely remove the program files, you must delete the folder in Windows system files.
“Run the downloaded anti-malware program