Trojan Horses....The most common virus in Pc

The term probably sounds familiar to you.

Whenever you scan your computer..then a sound comes warning a trojan horse Encounteres..in Avasta Home Edition

And you instantly delete it

At least it happens with me very frequently..but i like this virus very much

Have you ever tried to know about this?No ....Don't worry
I will explain you this...that seems to be sweet..but very much bitter
okk Let us proceed

In the IT environment, the Trojan Horse acts as a means of entering the
victim’s computer undetected and then allowing a remote user unrestricted access to any data stored on the user's hard disk drive..
These types of viruses were originally designed as a means of self expression by gifted programmers and did little more than to cause the system to lock up, behave abnormally
in a specific way

Their primary objective is to allow a remote user a means gaining access to a victim's machine without their knowledge. Once that has been achieved, the intruder can do anything with the
machine that the user can do.

The worse thing is that all these processes are hidden from the user who might be sitting in front of his own machine working on an entirely different document at the time.
The intruder can also cause havoc to the system by deleting (system) files, erasing valuable data or ultimately destroying the hard drive. Simply adding a command to the autoexec.bat file can do that.
Passwords offer no protection at all because today's Trojans are capable of recording the victim’s keystrokes and then transmitting the information back to the intruder.

After knowing about so much advantages of Trojan ..oops sorry disadvantages you must want to know about how
to protect your pc from this
Okk 1 :-
When you try to access a file on an NTFS file system volume, you may receive an "access is denied" error message.
This message will appear if another user has encrypted the file:

. To determine if a file has been encrypted, see the Quickly Check EFS Attributes article.
1.Start Windows Explorer, and then click Detail on the View menu to view the details of the folder's contents.
2.Click Choose Columns from the View menu, and then click to select the Attributes check box to add the Attributes column to the current view, and to view the file attributes.
You can also right-click any portion of the details header-column and click the Attributes column
to be displayed.
3:-If there is an "E" in the Attributes column for that file, the file is encrypted.
4:-You can also use the CIPHER command from a CMD window:

Run the CIPHER command without any parameters to display the encryption status of files and folders.
A U means that the file/folder is un-encrypted. An E means that it is encrypted.

This is a simple trick to check what trojan have done to your computer...I hope you have much
much knowledge of this sweet but bitter virus

If you have more tricks then please share...

Replies

You are reading an archived discussion.

Related Posts

This is way beyond, oour quest for interview aptitude puzzels and all. People you need to try this website out. Pretty simple games, but once you are done with trial,...
This is is way better than classic Super Mario. Not very into speeding games, Mario was a haven and super paper mario nintendo is cool, with new pexels, and flip...
Any one who completed M.Tech with S/W Engg. as a specialization in JNTU are available here...
Dear family members, In November 2009, we completed 4 years of our operations online. One of the most remarkable thing that happened on CE was incorporation of CE as "CrazyEngineers...
Official Announcement: https://www.crazyengineers.com/forum/announcements/31264-happy-new-year-2010-a.html