glossary

User Rating: / 0
PoorBest 

Please help us keep this glossary of Technical Terms up to date by sending us your criticism, comments or suggestions.

Email:  This e-mail address is being protected from spambots. You need JavaScript enabled to view it


Trojan (Trojan Horse Virus)


trojan horseA Trojan or Trojan Horse Virus is a program that usually gets downloaded installed and executed on a computer system which then appears to be performing some useful function but is unknowingly allowing unauthorized access to the user's computer system at the same time.

Antivirus Reviews

Hackers use Trojans to gain access to a user's computer remotely and then perform any number of malicious activities.  These nefarious activities can include but certainly are not limited to:

  • Data Theft.
  • Keystroke Logging.
  • Downloading or Uploading Files.
  • Viewing the Victims Screen.
  • Crashing the Users System.

 

Symptoms of Infection:

  • Very sluggish computer performance.
  • Random system lockups or crashes.
  • Browser redirection - you are taken to websites you were not searching for while browsing the Internet.
  • Excessive number of popup windows appearing at random while surfing the Internet.
  • You are informed that your system has 'hundreds' of active infections and you are redirected to a website that insists you pay for and download their specific software package to remove the infections.

 

Solution:

There are many good anti-virus / anti-spyware products on the market designed to detect and remove these types of infections.  McAfee and Kapersky are good but AVG and Avast! have similar products and offer a free downloadable version.  Be sure to complete a 'Full' system scan and quarantine and remove all active infections.  Configure your anti-virus software to perform 'active' scanning or real-time system monitoring.

 

Prevention:

  • Do not install software you have downloaded from the Internet unless it has come from a known, reliable source.
  • Use caution if using file sharing platforms such as LimeWire or torrent sites to download files.
  • Do not open any email attachments from unknown sources.
  • Use a good anti-virus/anti-spyware application and scan your system at least weekly.  Be sure your anti-virus software is totally up to date with the latest virus definitions.
  • For Windows users:  Be sure to visit the Microsoft update site and download all the latest Microsoft security patches.  http://www.update.microsoft.com

 

In some cases your system may have become unable to install anti-virus software or has become completely unusable.  If your computer system has unwanted Viruses, Spyware, Trojan Horse, Malware, Worm, Rootkit, Keylogging or Adware installed on or infecting it and you would like to have one of our San Antonio Virus Removal specialists clean and optimize your system please click the button below.

 

A website like okbridalshop.com will provide you with the highest quality in the industry.

Contact Us

Grand Opening New Office:

(210) 858-3593

Office Phone

 

Login / Register

Technical Terms

Powered by JoomlaGadgets

Member Stats

Latest Member : mohamed osman
Total Members : 5
Members Online : 0
Registered Today : 0
New This Week : 0
New This Month : 1

Who's Online?

We have 25 guests online
bioyuncu.com en guzel ve en yeni oyunlari siz ziyaretcilerine sunmaya devam ediyor araba oyunlarini sevenler icin sahin modifiye oyunu son zamanlarda en cok oynanan oyunlarin arasina girmeyi basardi.
720p HD kalite porno videolari asagida verecegimiz adreslerden izleyebilirsiniz. Tum dunya starlari ve en yuksek cozunurluk seks ve cinsel icerik icin harika siteler. joymii liseli porno porno kaliteli porno