answersLogoWhite

0


Best Answer

What type of software should you have on your computer to check for Trojan horses, worms, and other files that can wreak havoc to your computer?

User Avatar

Wiki User

13y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What type of software should you have on your computer to check for Trojan horses worms and other files that can wreak havoc to your computer?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Which protocol should be blocked to prevent Trojan attacks?

You don't block a network protocol to prevent Trojan Horses from entering your computer. It is the ability to recognize threats and scams that enable you to defend your computer.


Why should you have antivirus software?

The anti virus software protects the computer from being affected by viruses, trojan's, mallware and other "virusable" situations.


What is a Career interest area for a computer software engineer?

Computer software engineers should have a background in software and computers. They should also have a bachelor's degree in computer science.


When was the Trojan Horse computer Virus created and by who?

"Trojan Horse" does not refer to a specific computer virus, rather it refers to a particular characteristic of some computer malware. A Trojan Horse or Trojan is a bit of software that masquerades as legitimate software but contains hidden malware. It takes its name from the Greek tale from the Trojan War where the Greeks left a big wooden horse outside the gates of Troy with a bunch of Greek soldiers hidden inside. Just like the Greeks used their "Trojan Horse" to trick the Trojans into bringing them inside their defenses, Trojan malware tries to trick users into bringing the malware inside their computer defenses where it can then do its dirty work - such as (but not limited to) data theft, installing backdoors, turning the user's computer into a zombie in a botnet, trashing the computer. Since "Trojan Horse" only refers to a characteristic and not a specific virus, it is impossible to assign an actual date or perpetrator to it. It should also be understood that a Trojan is not really a virus. A virus replicates itself without user intervention, whereas a Trojan relies on tricking a user into downloading it. According to a survey conducted by BitDefender from January to June 2009, "Trojan-type malware is on the rise, accounting for 83-percent of the global malware detected in the world".


Where can I look software to find out if it will work on my computer?

The best software you should go though Microsoft they have the best computer software that you can purchase. They will also help you locate the best software for your computer.


How should you fix your infected computer?

antivirus software


What should a technician install antivirus software on?

Computer


What you should do if you have a Trojan virus?

One note of correction: a Trojan or Trojan horse is "malware" not a "virus". A virus spreads independently while a Trojan requires you to intentionally install the software containing the hidden malware (the fact that the malware is hidden in an apparently legitimate piece of software is where it gets its name by analogy to the Trojan Horse of Greek Mythology).If you realize you have a Trojan on your computer, you should go to the store and buy an anti virus kit or packet and install it. Nearly all good anti-virus programs will detect and clean up Trojans. A couple of caveats are in order however. Sometimes a Trojan will corrupt files such that they cannot be recovered. All the anti-virus can do is remove the Trojan and sometimesrepair affected files. When repair fails, your only recourse is to restore the corrupted files from a backup or reinstall the software that the corrupted files were part of in order to get back the uncorrupted files. A few Trojans can also contain boot-sector malware or rootkits. These are a good deal more difficult to detect and remove.


Can anti spyware software be installed when there is antivirus software in computer?

No. Of course it can. Spyware is different that of viruses. Everyone should have antivirus, spyware and malware detection software on their computer.


Do I want software with a windows software assurance?

If your software is Windows, then yes you want the assurance. If you are operating and providing for a Mac computer, you will need to use their own particular site to find the facts and software needed to operate your computer. Any other computer should be compatible with the windows software.


Why should you use antivirus software?

To protect your computer from viruses, malwares, and worms that will harm your computer.


Never Accept a Trojan Horse?

The original Trojan horse was sent as a gift and when opened, revealed hundreds of armed soldiers who wreaked havoc. Today’s Trojan horses are computer malware that appear to be useful software, but can result in stolen personal and financial information. Many Trojan horses find personal information such as social security numbers, passwords, PIN numbers and bank account information. Although commonly spread through email attachments, it can also be downloaded from the Internet, received in a P2P file transfer, or transferred while executing an Internet-based program. It can also be attached to web browsers or email programs with security flaws. The term “Trojan horse virus” is a misnomer. It is not a virus. Viruses, by their very definition, replicate themselves and attach to legitimate files and programs. A Trojan horse does not replicate or infect other files. It doesn’t need to be “cleaned” from the computer’s files and programs; they aren’t affected. Instead it must be removed in its entirety. It should be noted, however, that it can persuade others to open or install it, thereby acting as a virus with the help of computer users. Trojan Horses often have less malicious, but still unwanted goals. They put advertising on the desktop or install a tool bar on the web browser without notice. Mostly they give access to unwanted parties. These parties can then use the computer remotely to spam others or format the hard drive, for example. Some Trojans perform key logging functions. This is how they obtain passwords and other normally secure information. They copy and record the keystrokes used to access the computer or various accounts on the Internet. In this way, they aren’t harmful by themselves, but only in interaction with a person using that information for malicious purposes. To avoid Trojan horses from gaining access to a computer, never open a file attached to an email from an unknown or untrustworthy sender. Make sure to have an updated firewall when using the Internet. Perform virus scans regularly, and always keep browsers and email programs updated. Although not a virus, virus programs still search for and eliminate most Trojan Horses.