What is exactly a Trojan? How did it get into my computer and how do I remove it? These are some of the questions people ask me most of the times.
Well, here is a simple answer revealing: the truth about trojans. What is it exactly? The answer will leave you satisfied and shocked at the same time!
The word Trojan Horse comes from the Greek mythology, it is supposed to present itself as harmless and camouflages as one of your files, as something positive and safe or both.
A Trojan takes control of your computer remotely without your permission and awareness!
The hacker can accomplish almost anything, but here are a few tasks that they can execute. I would like you to realize how much power is in their hands:
- A hacker can delete your whole hard drive;
- any of the system core files;
- shut down your computer;
- corrupt almost any primary aspect of the os;
- look at your screen;
- use your internet for illegal purposes;
- see you through the webcam;
- listen to your conversation through the activation of your microphone;
- log your keystrokes notably passwords, credit card numbers, social security numbers and much more.
You might be wondering why, and the answer is:
- identity theft;
- unauthorized charges against your bank account (small random amounts that can pass unnoticed);
- redirection of your search engine for ad lucrative scopes, for fun, to spy on you, to ask you for ransom, and more, you get the point.
Shocked? I would be.
The purpose of this article is not only to inform you but to show you a few things you can do to stop this attack on your computer, privacy, and your bank account!
One of the symptoms of being infected with a Trojan is slowness, freezing, weird errors popping up just by opening regular programs, having a working Internet connection but you cannot access your browser, etc.
If you suspect you got infected, here is the very first thing you should do: PHYSICALLY DISCONNECT YOUR INTERNET CABLE! If you use WiFi, disable the wireless connectivity and change your security key, turn off your router and modem too if you have to.
The Internet connection is what I call it: the Trojan’s blood line. Without connection, the hacker cannot control your computer anymore, he/she is cut!
From here on, you can use your antivirus program to scan your system and hopefully it will be found and eliminated.
You can try it twice from safe mode and normal mode, you can also try a restore to a previous state.
Be cautious and take your time.
However, calling a professional PC Tech will be the best recourse, of course.
An expert like me :), will diagnose your system and manually remove all traces, and make sure it is gone forever. You will get recommendations and guidelines that help you safeguard your computer’s operating system, your valuable data, and even some of the hardware components.
The main rules to prevent this from happening are:
- strong firewall;
- an antivirus protection;
- don’t click on anything you do not trust;
- Do not download anything into your computer unless you trust it fully. The same applies to emails, links, the use of peer to peer websites in order to access free songs, movies, etc. Also, surfing adult sites, the last being the worst and most dangerous.
I think I made it clear what a Trojan is and what it can do.
Apparently you cannot find a straightforward explanation on the Internet. These few sources use complicated terminology and surround the concept with an aura of mystery, ultimately leaving you confused.
Stay tuned!