Troy wasn’t built in a day, but the city besieged from within, fell within a matter of hours. How? Well that’s pretty easy, the Trojans lined up a very attractive trophy outside the firewalls of Troy, without thoroughly scanning the trophy, it was selected and the package was hauled into the city. Being a RAT Trojan, the innocuous looking horse discreetly unpacked its malicious content thus allowing the Trojan extensions to exe. (or execute) actions which will further compromise the integrity of the city. Racing to raise the gates, the malicious militia invaded the town and disabled its functions from within, subduing resistance forces and making off with good loot like credit card information, security numbers and vital corporate information etc. T’was a good day for the hacker. If it were your computer you wouldn’t be so lucky—all these would have transpired in a matter of seconds.
So what is a Trojan in a nutshell? And no, it’s not a Trojan soldier being forced into the confines of an empty nut shell – a Trojan, like many of its brothers and sisters are viruses, malicious software (or malware) that infiltrate your computer, replicating itself to adverse effects to you and any other device it comes into contact with. There exists remedies to it and there are certainly ways to contain it but it would take one less curious eye and one less trigger happy finger if you’re going to “totally” shut out these pesky annoyances.
For starters, when in doubt, trash it – as the saying goes, curiosity killed the cat—or in this case, may kill your computer. According to Intel Company, McAfee, who provides a generous list of extensive anti-virus tips on their site, their number one recommendation towards virus prevention is to stay away from files with hidden, suspicious and untrustworthy origins/sources.
And you will find many more helpful suggestions in the link provided below. However even the best defense leaks sometimes and one can never be too prepared for the trying times that follow. What would help your cause significantly would be to backup your files on a regular basis – this way all is not lost when your firewall bursts and your hard drive is inundated with malicious swimmers and phishes.
To sum it all up, thread lightly and err on the side of caution. Update your antivirus regularly and conduct timely scans. What is that you say? Don’t have one? Well you’re in luck, there are plenty of antivirus software providers on the internet but be wary as many can be virus carriers themselves! But if you ever find yourself in that unfortunate position, try this on for size – Microsoft’s FOC security scanner http://www.microsoft.com/security/scanner/en-us/default.aspx but of course, if you suspect this one’s a virus waiting to pounce too, don’t click the link then. It’s just really lousy intuition on your part—for that there’s little saving.