Computer Viruses
Downloader Viruses

How can one get the Trojan horse virus?


Top Answer
User Avatar
Wiki User
2011-12-08 13:36:20
2011-12-08 13:36:20

"You can get a trojan horse virus from a number of things. Trojan horses come in a variety of forms, a common one being the rogue virus. You can get this virus from downloading content from peer-to-peer websites, or simply visiting websites. There is no foolproof way to avoid viruses."


Related Questions

'you need a Trojan horse to create a Trojan virus' LOL , Trojan Horse itself is a Virus !

Trojan horse Probably a Trojan Horse or a Worm

Yes, though not a usual one.

a trojan is a horse or computer virus that looks like a good thing but is not. a trojan is just and old horse.

A trojan horse (a computer virus).

Generic8 Trojan horse is a virus that computers can get. Trojan horses are malicious programs and can be removed with antivirus software.

The Trojan horse virus looks harmless or even beneficial to one's computer. This is a kind of malware that entices people to install it into their system.

A Trojan horse is a type of virus disguised as something good but when you open it it does it's damage.

If the virus are all in the virus vault, you are safe. i would recommend running a scan for more viruses. then if there aen't any you can safly remove the viruses. but before you do, make sure they didn't infect any important files.

A Trojan is a worm that is usually disguised as a desirable download that when executed drops other worms on your computer. Hence the name Trojan horse. A Trojan is not technically a virus because it cannot reproduce itself.

A Trojan Horse the file is 800000cb.@

A Trojan Horse virus spreads through anyway possible, but the main way to get a Trojan horse is by downloading un-legitimate programs from the internet. What does a Black Trojan horse do: enters and exit's your computer undetected bringing in viruses from a unknown source.

They call it a Trojan Virus because during the Trojan War in Greece, the Trojans created a wooden horse to trick their enemies, the Greeks. The horse is a gift from the Sea God, Poseidon. Seeing this, they marveled and took it inside their walls, then, in the dead of night, the Trojans, who were in the horse, attacked Greece, causing the fall of that city. The Trojan Virus does the same thing, it looks like something you might be interested in, but really, it's a virus. Hence the name "Trojan" because they invaded using a horse. It looked like one thing, but was another.

A virus that hides in a file that, when you run it, infects your computer.

A Trojan Horse virus comes into you computer, and your computer usually won't expect it. It then send many other different and horrible viruses into your comp. Look up the story of the Trojan Horse if you still don't understand.

It depends if the trojan horse was inside before networking was disabled.

Sounds like a file attached to a trojan virus

There are many but the worst is the "Trojan horse".

A Trojan horse virus occurs in infected documents, programs and executable files. They appear as something you would be familiar with so as to trick you into opening the file.

very bad my friend just got one Trojan horse and within 3 days his computer just stopped working. its one big virus and has many viruses within it.

There are many ways one can remove a trojan virus from one's computer. One can remove a trojan virus from their computer by downloading a virus removal software such as Sophos.

Trojan removal mainly related to removal of malware. For removing Trojan horse, Virus, worm use Trojan removal software.

There are several ways to get rid of the Trojan Horse virus. You can manually find the infected program and delete it or you can download a anti virus program which will do it for you. There is not a "best" Trojan Horse remover as they all work the same in trying to get rid of the virus. Some brands include Nortan Antivirus, McAfee,etc.

Copyright ยฉ 2020 Multiply Media, LLC. All Rights Reserved. The material on this site can not be reproduced, distributed, transmitted, cached or otherwise used, except with prior written permission of Multiply.