answersLogoWhite

0

What programs can be use to avoid Trojan horses?

Updated: 8/19/2019
User Avatar

Wiki User

13y ago

Best Answer

I always use Norton AntiVirus and Symantec.

Don't trust programs like Windows Fast AntiVirus.

User Avatar

Wiki User

13y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What programs can be use to avoid Trojan horses?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Can you get a virus from 360 share pro?

Don't use it! It is loaded with Trojan horses


Where can you find scph10000?

try using emzone.com or psx2extreme.com. don't use cracktorrent a lot of stuff on their are viruses or Trojan horses.


Where can you find Trojan programs any known websites?

don't screw around with that stuff, more trouble than it is worth. You have no idea what you doing, or else you would make the Trojan. Trying to download a Trojan for your use can be very dangerous.


Never Accept a Trojan Horse?

The original Trojan horse was sent as a gift and when opened, revealed hundreds of armed soldiers who wreaked havoc. Today’s Trojan horses are computer malware that appear to be useful software, but can result in stolen personal and financial information. Many Trojan horses find personal information such as social security numbers, passwords, PIN numbers and bank account information. Although commonly spread through email attachments, it can also be downloaded from the Internet, received in a P2P file transfer, or transferred while executing an Internet-based program. It can also be attached to web browsers or email programs with security flaws. The term “Trojan horse virus” is a misnomer. It is not a virus. Viruses, by their very definition, replicate themselves and attach to legitimate files and programs. A Trojan horse does not replicate or infect other files. It doesn’t need to be “cleaned” from the computer’s files and programs; they aren’t affected. Instead it must be removed in its entirety. It should be noted, however, that it can persuade others to open or install it, thereby acting as a virus with the help of computer users. Trojan Horses often have less malicious, but still unwanted goals. They put advertising on the desktop or install a tool bar on the web browser without notice. Mostly they give access to unwanted parties. These parties can then use the computer remotely to spam others or format the hard drive, for example. Some Trojans perform key logging functions. This is how they obtain passwords and other normally secure information. They copy and record the keystrokes used to access the computer or various accounts on the Internet. In this way, they aren’t harmful by themselves, but only in interaction with a person using that information for malicious purposes. To avoid Trojan horses from gaining access to a computer, never open a file attached to an email from an unknown or untrustworthy sender. Make sure to have an updated firewall when using the Internet. Perform virus scans regularly, and always keep browsers and email programs updated. Although not a virus, virus programs still search for and eliminate most Trojan Horses.


What shavings should you avoid using around horses?

Never use Walnut Shavings around horses. They will cause life threatening founder.


Is the Trojan horse virus detectable?

A Trojan Horse is not a specific virus; rather, it is a name for several more violent viruses. Most Trojan horses are detectable, depending on which Anti-Virus software you use, however new ones are created daily, and it's impossible for anyone to keep up.


Are horses used in psychology?

Yes, they are commonly used in therapy programs with everything from mentally and physically disabled people to programs geared specifically for veterans dealing with PTSD. And many higher dollar programs in self help often incorporate the use of horses as "mirrors" so to speak, to reflect back to us our own emotions and state of mind, which horses are quite good at.


What is a Trojan removal?

Trojan removal mainly related to removal of malware. For removing Trojan horse, Virus, worm use Trojan removal software.


What kind of weapon Odysseus the god of the Trojan War use?

the Trojan horse


I have coreguardantivirus2009 Trojan fakeav and internet security 2010 on my computer wondering if they're removable with norton?

These are fake antivirus programs, usually Norton misses such malware. Use MalwareBytes or SUPERAntispyware instead.


Which one is not a malicious code viruses Trojan horses worms cookies?

Cookies are not malicious code. They are just text files that save data for the sites you use. While cookies can be used maliciously, they are not malicious in and of themselves.


What did they use to make the Trojan horse?

Wood.