![]() These could be identity theft, data theft, crashing computers, spying or tracking user activities. Trojans can have multiple usages, which depend on the motives of the attacker. It is also imperative that you be very careful while making the selections at the time of installation. Although every freeware doesn't come with Trojan, it is still advised that one should download software and freeware from authentic sources only. A Trojan can also come as a payload with freeware and shareware available on the Internet. Once the user downloads the attached file and runs it, the file starts corrupting the system. These emails are disguised in a way that they look authentic. Once it runs on the computer, it causes problems like killing background system processes, deleting hard drive data and corrupting file allocation systems.ĭescription: Mostly Trojans are introduced via email attachments. It is a type of computer software that is camouflaged in the form of regular software such as utilities, games and sometimes even antivirus programs. ![]() Definition: Trojan or Trojan horse is the name given to a computer virus.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |