Computer Trojan, Trojan Meaning, How To Protect Yourself

In computing, Trojan or Trojan horse refers to a malicious computer program that’s utilized to lacerate into a computer by misleading users of its real intent. Trojan horse is a term that’s derived from the popular Ancient Greek story of a wooden horse that used to assist Greek troops attack Troy city by stealth.

Social engineering is what spreads Trojans generally. Even though the payload of Trojan can be anything, a good number of modern forms usually act as backdoor. They contact a controller that has unauthorized access to an affected computer. The infection enables a hacker to gain entry to your personal information such as IP address, passwords or even banking information. Read: Computer Virus, Worm, and Trojan Horse. Three Different Problems

Trojans don’t work like computer viruses or worms. They never attempt to inject or propagate themselves to other files.

They are just malicious programs that perform unauthorized actions by the user.

Excellent examples of such actions include:

  • l Copying data
  • l Modifying data
  • l Blocking data
  • l Deleting data

How do Trojans affect you?

Trojans can be categorized into the kind of actions they initiate on your computer. Here are some of the actions;


Trojan-Banker are those programs tailored to steal account data from debit cards, credit cards, e-payment systems, online banking systems etc.


These are programs that attack against targeted web address. By sending several requests from your computer to other infected computers, the attack can be able to overwhelm a target address thus leading to a ‘denial of service.’


Backdoor Trojans usually provide malicious users with the ability to enjoy remote control over your infected computer. Such Trojans allow the author to perform any action they wish on an infected computer. Some of the things backdoor Trojan can do include rebooting a computer, deleting files, launching files, sending files, receiving files, displaying data etc. They are handy when it comes to uniting a set of victim computers to form a zombie or botnet network that can be utilized for criminal purposes.


Hackers use these programs to install viruses and/or Trojans. Their objective is to prevent the detection of harmful programs. Unfortunately, not all anti-virus programs are effective at scanning all components inside a Trojan.


Exploits refer to those programs that have code or data to take advantage of the susceptibility within an app software running on a computer.


These are programs that stimulate the activities of an anti-virus. They come in handy at extorting money from individuals in return for the removal of the threats. In some instances, the threats reported can happen to be non-existent.


Simply put, rootkits are specially tailored to conceal particular activities or objects in your system. In most instances, their main objective is to ensure that malicious programs aren’t being detected. In the end, they’re able to extend the time in which the programs run on your infected computer.


These are those programs with the ability to spy on how you use your computer. For instance, they can do so by tracking the information you enter through your keyboard or when taking screen shots or by obtaining a list of running apps.


Trojan-IM programs normally steal your passwords and login for purposes of instant messaging programs such as Skype, Yahoo Pager, AOL Instant Messenger, MSN Messenger and ICQ.


The programs is handy at modifying data on a computer. When it does so, programs in your computer cannot run properly. It simply means that you’ll not be able to utilize certain data in your computer. Criminals will only unblock your data or restore the performance of your computer after you’ve paid them the amount of money they request. 


Notifiers are normally utilized in multi-component Trojans so as to notify harmful users of a successful installation of harmful programs on the computers of victims.


These are those programs that are designed to get away with user account information such as passwords and logins from infected computers. PSW simply stands for Password Stealing Ware. 

Trojan Proxy

Trojan Proxy simply refers to a Trojan horse that’s designed to utilize a victim’s computer like a proxy server. This way, the attacker will be able to do anything he or she wants in your computer. For instance, the attacker can conduct credit card fraud as well as an array of other illegal activities. He or she can even utilize your system to launch harmful attacks against the other networks.


This is a kind of a Trojan that continues to remain resident in a system memory. While a resident, it regularly or continuously attempts to connect to particular websites.


These refer to archives that are tailored to freeze or slow down the performance of your computer’s disc. They have the ability to pose threats to both mail servers and file. This is especially true when an automated processing system is utilized to process incoming data.

How do you protect yourself from Trojans?

One effective way of protecting yourself against Trojans is through the installation of an efficient anti-malware software. Doing so can protect your smartphones, tablets, Macs, laptops, PCs etc, against Trojans. Rigorous anti-malware solutions such as Kaspersky Anti-Virus have the ability to detect and/or prevent any form of Trojan attack on your personal computer. Kaspersky Internet Security tailored for Android can be handy at delivering world-class virus protection against smartphones that support Android.

The Kaspersky Lab boasts anti-malware products which defend the following gadgets against Trojans:

  • l Tablets
  • l Smartphones
  • l Apple Macs
  • l Linux computers
  • l Windows PCs
Facebook Comments