The Trojans have landed

Troy wasn’t built in a day, but the city besieged from within, fell within a matter of hours.  How?  Well that’s pretty easy, the Trojans lined up a very attractive trophy outside the firewalls of Troy, without thoroughly scanning the trophy, it was selected and the package was hauled into the city.  Being a RAT Trojan, the innocuous looking horse discreetly unpacked its malicious content thus allowing the Trojan extensions to exe. (or execute) actions which will further compromise the integrity of the city.  Racing to raise the gates, the malicious militia invaded the town and disabled its functions from within, subduing resistance forces and making off with good loot like credit card information, security numbers and vital corporate information etc. T’was a good day for the hacker.  If it were your computer you wouldn’t be so lucky—all these would have transpired in a matter of seconds.

 

So what is a Trojan in a nutshell? And no, it’s not a Trojan soldier being forced into the confines of an empty nut shell – a Trojan, like many of its brothers and sisters are viruses, malicious software (or malware) that infiltrate your computer, replicating itself to adverse effects to you and any other device it comes into contact with.  There exists remedies to it and there are certainly ways to contain it but it would take one less curious eye and one less trigger happy finger if you’re going to “totally” shut out these pesky annoyances.

 

For starters, when in doubt, trash it – as the saying goes, curiosity killed the cat—or in this case, may kill your computer.  According to Intel Company, McAfee, who provides a generous list of extensive anti-virus tips on their site, their number one recommendation towards virus prevention is to stay away from files with hidden, suspicious and untrustworthy origins/sources.

Taking out Cyrus the Virus – putting the bunny back in the box

 

And you will find many more helpful suggestions in the link provided below.  However even the best defense leaks sometimes and one can never be too prepared for the trying times that follow.  What would help your cause significantly would be to backup your files on a regular basis – this way all is not lost when your firewall bursts and your hard drive is inundated with malicious swimmers and phishes.

To sum it all up, thread lightly and err on the side of caution.  Update your antivirus regularly and conduct timely scans. What is that you say?  Don’t have one?  Well you’re in luck, there are plenty of antivirus software providers on the internet but be wary as many can be virus carriers themselves!  But if you ever find yourself in that unfortunate position, try this on for size – Microsoft’s FOC security scanner http://www.microsoft.com/security/scanner/en-us/default.aspx but of course, if you suspect this one’s a virus waiting to pounce too, don’t click the link then.  It’s just really lousy intuition on your part—for that there’s little saving.

 

Resources:

http://en.wikipedia.org/wiki/Computer_virus

http://home.mcafee.com/virusinfo/anti-virus-tips

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s