Saturday, 6 October 2012

All About Torjans

Follows are some indications that are common symptoms of getting infected with Trojan horse.


♠Opening and closing of CD/DVD-ROM
♠Computer screen blinks, turns upside down, changes resolution.
♠Wallpaper changes automatically.
♠Disable of task manager.
♠Task bar disappears for while.
♠Unusual messages.
♠Sudden opening of web pages.
♠Change in data and time of system.
♠Right click and left click swaps their functions.
♠Freezing of mouse and keyboard.
♠Auto movement of mouse pointer.
♠Playing of music even though you haven't turned on any music player.
♠Mouse pointer disappears.
♠Unusual restart and shutdown of PC.
♠Unwanted software installation.
♠Disable of Anti-Virus and Firewall.
♠Change in screen saver.
♠Disappear of task manager, tray icons, quick launch, start button and desktop icons.
♠Fluctuation in screen light intensity and volume.
♠Changing of screen savers.
♠Others receiving emails from you which aren't sent by you.
 

Anti Torjans

Anti-Trojans are software that are specially designed to help you detect and protect yourself from Trojans. They can also detect presence of virus and worms but are specially crafted to remove Trojans from your system. However no Trojan Remover is 100% effective. Therefore its good to regularly update your anti-Trojan software along with anti-virus and firewall

Following is list of Anti-Trojan Softwares

◘Trojan Guard
◘Trojan Hunter
◘Zone Alarm
◘Win Patrol
◘Leak Test
◘Kerio Personal Firewall
◘Sub-Net
◘TAVScan
◘SpyBot Search & Destroy
◘Anti-Trojan
◘Anti-Trojan Elite
◘Cleaner
◘Comodo BOClean
◘XoftspySE
◘Spyware Doctor
◘Spyware Fighter

A Trojan infection can be avoided by the following measures:


◘Do not download any file from unknown people or site without making sure that the file is genuine.
◘While opening file make sure what the file is, even if the file comes from a friend.
◘Do not make use of attributes in programs that automatically get or preview files.
◘The user should not be lulled into a false sense of security just because an anti-virus program is running on the system.
◘Ensure that the corporate perimeter defenses are kept continuously up-to-date.
◘Filter and scan all content at the perimeter defense line that could contain malicious content.
◘Run local versions of anti-virus, firewalls, and intrusion detection software at the desktop.
◘Rigorously control user's permission within the desktop environment to prevent the installation of malicious applications.
◘Manage local workstation file integrity through check-sums, practice auditing, and port scanning.
◘Monitor internal network traffic for odd ports or encrypted traffic.
◘Use multiple virus scanners
◘Install software for identifying and removing adware/malware/spyware.

No comments:

Post a Comment