Hacker, Researcher and Author.

Securing Your Networks From Being Infected By Trojans

A Trojan, sometimes referred to as a Trojan horse, is non-self-replicating malware that appears to perform a desirable function for the user but instead facilitates unauthorized access to the user's computer system. 

Is trojan virus Dangerous?
The short answer is yes, and the long answer is sometimes No, because there are near a thousand different trojan horse viruses and they all will most likely alter your computer in some way or another. 

Working of Trojans!

Types of Trojans:

 

1.Remote Access Trojans

2.Password Sending Trojans

3.Keyloggers

4.Destructive Trojans

5.Denial of Service (DoS) Attack Trojans

6.Proxy/Wingate Trojans

7.FTP Trojans

8.Software Detection Killers
 
How to Get Rid of Trojans:
Here are some practical tips to avoid getting infected (again). For more general security information, please see our main security help page.
  1. NEVER download blindly from people or sites which you aren't 100% sure about. In other words, as the old saying goes, don't accept candy from strangers. If you do a lot of file downloading, it's often just a matter of time before you fall victim to a trojan.
  2. Even if the file comes from a friend, you still must be sure what the file is before opening it, because many trojans will automatically try to spread themselves to friends in an email address book or on an IRC channel. There is seldom reason for a friend to send you a file that you didn't ask for. When in doubt, ask them first, and scan the attachment with a fully updated anti-virus program.
  3. Beware of hidden file extensions! Windows by default hides the last extension of a file, so that innocuous-looking "susie.jpg" might really be "susie.jpg.exe" - an executable trojan! To reduce the chances of being tricked, unhide those pesky extensions.
  4. NEVER use features in your programs that automatically get or preview files. Those features may seem convenient, but they let anybody send you anything which is extremely reckless. For example, never turn on "auto DCC get" in mIRC, instead ALWAYS screen every single file you get manually. Likewise, disable the preview mode in Outlook and other email programs.
  5. Never blindly type commands that others tell you to type, or go to web addresses mentioned by strangers, or run pre-fabricated programs or scripts (not even popular ones). If you do so, you are potentially trusting a stranger with control over your computer, which can lead to trojan infection or other serious harm.
  6. Don't be lulled into a false sense of security just because you run anti-virus programs. Those do not protect perfectly against many viruses and trojans, even when fully up to date. Anti-virus programs should not be your front line of security, but instead they serve as a backup in case something sneaks onto your computer.
  7. Finally, don't download an executable program just to "check it out" - if it's a trojan, the first time you run it, you're already infected!

 Hope you liked the post ! Kindly give your feedback by commenting!

5 comments:

  1. I find your article on trojans very interesting, specially the section about how to get rid of them. Effective methods indeed. Keep it up

    ReplyDelete
  2. @Ethical Hacker Training
    Thanks for your feedback

    ReplyDelete
  3. Wow!
    Thats classy man! Great piece of work :)
    Thanks for sharing that,
    Really a very nice and detailed review on How to secure the network from Trojan,which is very helpful, thanks a lot once again.

    By the way check out the Professional Training and Certifications for Security Courses from this link: http://www.eccouncil.org/certification.aspx

    ReplyDelete
  4. hey one thing u forgot to write that dont use shortcuts given by a third person which might contain a target as an executable trojan!!!!!!!!

    ReplyDelete
  5. @Anonymous
    yes i know that,Threr are lots of ways that can be used to execute trojans,Any ways thanks for your advice

    ReplyDelete

© 2016 All Rights Reserved by RHA Info Sec. Top

Contact Form

Name

Email *

Message *

Powered by Blogger.