Trojan Virus – A Type of Malware Program


A Trojan horse, often shortened to Trojan, is a type of malware designed to provide unauthorized, remote access to a user’s computer. Trojan horses do not have the ability to replicate themselves like viruses; however, they can lead to viruses being installed on a machine since they allow the computer to be controlled by the Trojan creator. The term gets its name from the Greek story of the Trojan War, when the Greeks offered the Trojans a peace offering in the form of a large wooden horse. However, once the Trojans wheeled the horse behind their closed gates and night fell, the soldiers hidden inside the horse climbed out and opened the city gates, allowing the Greek army to infiltrate Troy and capture the city.

Trojan horse software operates the same way, where Troy is your computer and the horse is the benign-seeming application. Trojan horses can assist an attacker into turning a user’s computer into a zombie computer, stealing various data such as credit card information, installing more malware, keylogging and various other malicious activities. Also, it is possible for other crackers to control the compromised computer simply by searching for computers on a network using a port scanner and finding ones that have already been infected with a Trojan horse. Trojan horses continue to increase in popularity and currently account for the majority of known malware found on the web.


Steps to Remove Trojan Virus from your PC:

Materials Needed:
The materials needed to remove the Trojan Virus from your computer are Anti-virus application, computer, Operating System installer, backup files.

Step 1
Since these threats normally remain active in system memory, the initial step is to restart the computer system in order to clear the memory of any resident processes. If the protection software is capable, reboot the machine in Safe Mode.
Step 2
Start the protection application and initiate a scanning of the entire system including the system memory. Make sure that the automatic healing (when applicable) is disabled.
Step 3
When a threat is identified, the security program will normally prompt the user for a preferred action like delete, quarantine, or repair among others. Normally, Trojan components are very similar to legitimate Windows system files so choose accordingly.
Step 4
Have the installation CD of the Operating System handy in case any of the system files need to be reinstalled due to corruption or infection. These system files are normally stored under the i386 folder in the CD installer.
Step 5
After completing the scanning and cleaning process, exit the security program and restart the machine allowing it to load in normal mode.
Step 6
When the desktop appears, remove the contents of the Recycle Bin by right clicking it and choosing the option ‘Empty Recycle Bin’.
Step 7
Click on the ‘Start’ Menu and right click on the ‘My Computer’ icon and select the ‘Properties’ option. Select the ‘Turn off System Restore’ option in the ‘System Restore’ tab and click ‘Apply’. Click on ‘Yes’ and then ‘OK’ to confirm the action. This is done to prevent the possibility of reloading the Trojan that may have been saved in the System Restore points of the machine.
Step 8
Update the virus definitions of the protection software by connecting to the Internet. After completion of the update process, rescan the machine in normal mode to make sure that any remaining Trojan components are deleted.
Step 9
Restart the machine to complete the process. Remember to keep the definition database engine of the protection program updated to prevent any future infections.


About Author

Nick Barnett

Leave A Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.