English Deutsch Français Italiano Español Português 繁體中文 Bahasa Indonesia Tiếng Việt ภาษาไทย
All categories

how to delete or avoid trojan horse. is it spreads thro email or peer to peer to file sharing

2006-08-20 23:42:00 · 3 answers · asked by Anonymous in Computers & Internet Internet

3 answers

TROJAN HORSE

A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.
The term comes from the a Greek story of the Trojan War, in which the Greeks give a giant wooden horse to their foes, the Trojans, ostensibly as a peace offering. But after the Trojans drag the horse inside their city walls, Greek soldiers sneak out of the horse's hollow belly and open the city gates, allowing their compatriots to pour in and capture Troy.


Trojan horses are broken down in classification based on how they breach systems and the damage they cause. The seven main types of Trojan horses are:

Remote Access Trojans
Data Sending Trojans
Destructive Trojans
Proxy Trojans
FTP Trojans
security software disabler Trojans
denial-of-service attack (DoS) Trojans

2006-08-20 23:50:44 · answer #1 · answered by Mrknowitall 3 · 0 1

Hunter you have been hunted by TROJAN. well Trojan is VIRUS written in low level language or we call is Assembly. To remove this use TROJAN REMOVER.

Hunter do not be hunted anymore here is your free download link

http://www.google.co.uk/search?hl=en&q=free+download+trojan+remover&btnG=Search&meta=

2006-08-21 06:53:31 · answer #2 · answered by Joe_Young 6 · 0 0

Try with a local antivirus or firewall.. antivirus like avast 4 home are available for free.. it has also a P2P and mail protection.. safest way: firewall...

2006-08-21 06:47:49 · answer #3 · answered by cyngus65 3 · 0 0

fedest.com, questions and answers