Oct 8, 2009

What is a Trojan horse?

He believes that everyone who was at school knows, “Trojan horse. It is a large wooden horse that the Greeks of the city in the Trojan War to penetrate. They have two men on horseback, so that if the Trojans to take in your town, they can come and destroy the place. Well, in the computer world, a Trojan horse does the same thing. This is probably explains its name.

Trojan is a small program, which consists of two parts: the client and the server does not exist. Customer will receive an attacker to gain access to a computer. Server is installed on your computer (usually without your knowledge), when the infected file. If you have installed around the world access to your hard drive using a simple program. Unfortunately, this program is so simple that anyone, and this makes the chances of being reduced even more.

Now, we wonder, as the owner of the customer know if the program is installed on your computer. This could be your IP. Your IP-address is a unique number, to receive from the ISP as your Internet connection. Anyone with a Trojan customers to find your IP-address and find a computer. This person does not agree the same thing that you download the Trojan.

Trojan horse can do a lot of fun (the pirate), but can cause serious harm to your computer. Open your DVD is no reason several times in a row. When you talk about the microphone, the attacker knows exactly what you are saying. An attacker can play audio files, images, messages in the victim, delete files, keyboard, and much more! If you’re really a bandit on your tail, the system is completely dead in minutes.

Well, what can be done to make sure that you get a trojan horse? Well, best thing to do is use a good Anti-Virus installed. When you download a Trojan horse, by chance, you should inform the program and delete them. In addition, the creation of a “Trojan horse” is better to remove the right words. Be careful what you download to your hard drive. If you do not know where he is, or that the owner has not been opened. Een Zeer Beroemde paarden verspreiding van Trojaanse Middel van door and mailbijlagen. When you open it, you’re too late. Make sure that you know people before you open e-mail.

The conclusion of this study is that it must be very careful with the program or open a file on your system. Make sure you know about the origin and if you agree. To absolutely no infection, install a decent anti-virus.

0 comments:

Post a Comment

Please Submit Your Comment here.

 

Followers

ERHAES INFO Copyright © 2009 by: ErhaesCom