This Static Spot is open for sponsor

Click Here to Sponsor MCT Eric Post in Full Page

Afrikaans Afrikaans Albanian Albanian Amharic Amharic Arabic Arabic Armenian Armenian Azerbaijani Azerbaijani Basque Basque Belarusian Belarusian Bengali Bengali Bosnian Bosnian Bulgarian Bulgarian Catalan Catalan Cebuano Cebuano Chichewa Chichewa Chinese (Simplified) Chinese (Simplified) Chinese (Traditional) Chinese (Traditional) Corsican Corsican Croatian Croatian Czech Czech Danish Danish Dutch Dutch English English Esperanto Esperanto Estonian Estonian Filipino Filipino Finnish Finnish French French Frisian Frisian Galician Galician Georgian Georgian German German Greek Greek Gujarati Gujarati Haitian Creole Haitian Creole Hausa Hausa Hawaiian Hawaiian Hebrew Hebrew Hindi Hindi Hmong Hmong Hungarian Hungarian Icelandic Icelandic Igbo Igbo Indonesian Indonesian Irish Irish Italian Italian Japanese Japanese Javanese Javanese Kannada Kannada Kazakh Kazakh Khmer Khmer Korean Korean Kurdish (Kurmanji) Kurdish (Kurmanji) Kyrgyz Kyrgyz Lao Lao Latin Latin Latvian Latvian Lithuanian Lithuanian Luxembourgish Luxembourgish Macedonian Macedonian Malagasy Malagasy Malay Malay Malayalam Malayalam Maltese Maltese Maori Maori Marathi Marathi Mongolian Mongolian Myanmar (Burmese) Myanmar (Burmese) Nepali Nepali Norwegian Norwegian Pashto Pashto Persian Persian Polish Polish Portuguese Portuguese Punjabi Punjabi Romanian Romanian Russian Russian Samoan Samoan Scottish Gaelic Scottish Gaelic Serbian Serbian Sesotho Sesotho Shona Shona Sindhi Sindhi Sinhala Sinhala Slovak Slovak Slovenian Slovenian Somali Somali Spanish Spanish Sundanese Sundanese Swahili Swahili Swedish Swedish Tajik Tajik Tamil Tamil Telugu Telugu Thai Thai Turkish Turkish Ukrainian Ukrainian Urdu Urdu Uzbek Uzbek Vietnamese Vietnamese Welsh Welsh Xhosa Xhosa Yiddish Yiddish Yoruba Yoruba Zulu Zulu

 

 

Article Navigation

Back To Main Page


 

Click Here for more articles

Google
Crouching Trojan, Hidden Malware
by: Joel Walsh
Trojans are not just more dangerous than computer viruses, they're stealthier, too. Find out where they hide.

Minions of an evil master lurk in your hard drive, crouching in your system registry, ready to pounce.

What Is a Trojan?

The word "Trojan" is a mystery to most people, even many who think they know its true meaning. If more people really understood what Trojans are and the risk they pose, there would be fewer Trojans, since fewer people would ever leave their machines vulnerable to them.

A Trojan is malware. Malware is a special kind of software, like spyware, adware, and viruses that no one wants. Yet a Trojan is more dangerous than any other kind of malware. Unlike those other types of malware, Trojans are not mindless flunkies hurled at your computer by their masters. A Trojan is a master that first craftily infiltrates your PC, then unleashes its malware henchman.

What Trojans Do

• Some Trojans may install worms, which are programs that use your computer and internet connection to send out armies of server requests in the hope of shutting a particular website down, or to spread viruses or worms to other computers.

• Other Trojans are thieves, out to steal your computer's processing power and turn it over to their hacker masters, often by setting up a backdoor, a hidden internet connection that allows for outside manipulation of your machine.

• Some thieving Trojans are fraudsters that may go after your financial information by installing keyloggers that record what you type--especially passwords and important banking numbers.

How Do Trojans Hide?

No one thinks they have a Trojan on their computer until it is too late. That's because they do such a good job of blending in.

• Trojans come disguised in innocuous file names, often pretending to be a helper application to software or an essential operating system component.

• Trojans try to avoid calling attention to themselves, and so will often only interfere a little, if at all, with your computer's performance, choosing instead to do their dirty work while your machine is idle. Computers left on and connected to the internet while their owners are asleep or at work or school are favorite targets.

How Do You Remove Trojans?

Removing Trojans can be a can of worms. Here's why you need to proceed with caution:

• Since Trojans can disguise themselves as software your computer actually needs, you could accidentally delete a vital program or system registry entry. In the worst case scenario, you won't be able to restart your computer.

• Many Trojans are trained for survival. When you try to removal them manually, they may simply copy themselves to another directory.

Intimidated? You don't have to be. Rather than trying to defuse a Trojan yourself, why not call in the bomb squad? Good anti-spyware and antivirus software will fight Trojans, too. Just make sure to look for a program that specifically says it fights Trojans. After all, this is no job for amateurs.

About the author:
Joel Walsh writes for http://www.spyware-refuge.comabout spyware removal: http://www.spyware-refuge.com/spyware-removal.html?spyware removal [Publish this article on your website! Requirement: live link for above URL/web address w/ link text/anchor text: "spyware removal" OR leave this bracketed message intact.]


Circulated by Article Emporium

 



©2005 - All Rights Reserved

This Static Spot is open for sponsor

Data Recovery Information

Read Articles:

Microsoft’s Spyware Fight
How to find Adware removal that is re...
Microsoft Patch Management for Home U...
Registry Cleaners: Why do you need one?
The Webdesign Business - 5 Surefire W...
How To Remove Winfixer 2005 Plus Unwa...
Adware And The Case Against Bundled S...
Protect your self from Anti-Spyware f...
5 Critical Steps to Protecting Your C...
From Spyware with love!
Can You Survive In An Online World?
Windows vs. Linux, A Comparison
You Need a Spyware Remover!
The Quickest Way I Know To Secure You...
What's in a (TLD) name?
Is Your Music Player Spying On You?
The never ending Spyware……story
The Saga of the Annoying Adware

More Article Pages 1 - 2

Data Recovery - What Not to Do!

Data recovery is a tricky thing, and if you've somehow deleted or had your important files corrupted or lost due to human error, business espionage, faulty hardware or software or any other reason; the good news is that your lost data is probably recoverable. This article will show you a few things NOT to do when an event such as this occurs.

Don't run the drive anymore, or use the device. (MP3, portable storage, camera card, whatever) If you think it won't hurt to even just poke around the internet for a solution to this mess you've made/found, you're wrong! Don't install or run anything on the drive you hope to recover data from. Only access this drive again from a healthy PC with the software solution you're going to use. Since files are overwritten in the order they've been deleted, the last files that have been excised from your drive will be the first to be lost permanently. Even just surfing, with all the cookies and temporary internet files that are always being generated will often doom the process without you even knowing about it.

Don't use tools that may reside on your computer, such as Scandisk, or a boot record utility, as these will probably overwrite exactly the files you're seeking to get back.

In short, be careful! Your data may very well be recoverable, as long as you don't do something to erase it forever! Find a good data recovery software solution, and then follow the instructions to the letter, and you'll more than likely live to see your lost data return!

Keith Thompson is the webmaster at Data Recovery Service a site cenetered around helping you get back your lost data!



©2005 - All Rights Reserved

JV Blogs Visit free hit counter