Posts

Showing posts with the label Trojan

INVISIBLE TROJANS: THE 3 MOST COMMON VARIANTS

Image
Invisible Trojans do a lot of damage. What Trojans are out there and what can you do to prevent them from infecting your devices. According to mythology, the Greeks conquered the city of Troy by building a wooden horse. Soldiers hid in its hull. They gave the horse to the Trojans who drew it to their city. At night the Greek soldiers crawled out of their hiding place. They opened the city gate and let more fighters into the city, who then destroyed Troy  . Today they are no longer made of wood and do not smuggle in warriors. Nevertheless, invisible Trojans cause damage to computers, tablets and smartphones just as much as their historical model. Because they smuggle in viruses, for example. Accordingly, the goal of their propagators is not to destroy a city. Their tasks range from installing additional malware to spying on data and destroying all files. How Does the Horse Get Into the Calculator? Invisible Trojans are often hidden in app...

TROJAN AND VIRUS: CONCEPTS AND ITS PRECAUTION

Image
With the spread of broadband connections, viruses and trojans are a lot of talk right now. Indeed, it has become increasingly easy to break into the machines of individuals, not familiar with security techniques and whose machines are sometimes connected to the Internet 24 hours a day. We will see in this article how to better know these programs which can be devastating and especially to study some simple techniques to protect themselves from them. Without sinking into paranoia. Definitions and concepts What is a virus? A virus is a computer program that can spread autonomously from machine to machine and from file to file. What is a Trojan? A trojan, or trojan horse or even trojan, is a computer program which is installed by masking itself in another healthy program. It does not generally reproduce and is used as a base (server) to allow intrusions on a machine. The number of Trojans is as impressive as the variety of actions they allow. Some simply open access to the infes...