Mostly people confuse the term computer Trojan with computer virus. They think that both of these are same. No doubt they both infect your computer but they both have slightly different characteristics. Trojan is a malicious program that cannot replicate itself like the computer virus but can cause serious security problems. It appears as a useful program but in reality it has a secret code that can easily access your system.
Trojan got its name after ancient Trojans.
During Siege of Troy ancient Trojans believed that the large wooden horse left behind by the Greeks outside the gates was a sign that after years of war they now wanted peace because the Greeks were losing the war. The Trojans accepted that gift and brought it inside their city. The Greek soldiers were inside that horse. During night they opened the main door so that more soldiers could come inside the city and they could easily attack on the Trojans. Similarly a computer Trojan appears something else but in reality it harms your system.
FUNCTIONS OF TROJAN
1)It creates backdoor to your computer which allows the hacker to do anything on your system or we can say that the hacker will get control on your system without your permission. He can see your e-mails, record keystrokes, access password protected accounts and can get any type of information about your computer.
2)It can do malicious functions like rebooting your computer or deleting files.
3)It also installs spyware which takes you to the unwanted sites.
4)Some annoying Trojans can change desktop or add silly active desktop icons.
HOW TROJANS CAN SPREAD
Hidden in programs
They remain hidden in the programs that appear useful because when you download a program from a site you think that this program will be useful but instead it contains Trojan. When you run that program your computer gets infected.
Trojans also spread through e-mails. Attacker sends you an email attachment which has executable file. When you open that attachment the Trojan inside it will infect your system. For e.g.:- there is a file â€œcool_girls.txt.exeâ€. â€œtxtâ€ shows that it is a text file and â€œexeâ€ shows that this executable file has the extension. Sometimes you may not notice about â€œexeâ€ and take it as only a text file. When you open this file your system gets infected. Some users use the operating system that even allows hiding these extensions so that the file appears a harmless file and it will look as â€œcool_girls.txtâ€
By sending or receiving files from an unknown person on MSN, yahoo messenger, AIM etc may infect your system with Trojans.
Another tactics of spreading Trojan is by embedding it in some image files. Do not open an image file from an unknown person or even from known person when the arrival of file is unexpected.
Operating system vulnerabilities
It also spreads through operating system vulnerabilities because some
Parts that connect computer to the internet have security risk.
HOW TO PROTECT YOUR COMPUTER OR FIGHT AGAINST TROJAN
1)Almost all antivirus software and some antispyware programs can detect and remove the Trojan. Always keep your antivirus up to date for better protection. If no Trojan is found even after the scan and you still think that your system is infected by a Trojan then you can verify this from an expert.
2)Do not download anything from unknown person or suspected site about which you are not 100% sure.
3)Always use caution while opening an email attachment even it is from a known person.
4)Do not receive files during the chat from an unknown source.
5)Firewalls will also protect your computer from Trojan because it looks over the open ports of your system for incoming data. It will either block or let it pass according to the choice of user.