Copywrite Advantage Computers OL 2012
Trojan Horse Virus and your PC
As you use your PC to browse the internet and find applications that you need and want to use to better your PC, you will come across different links that you will be asked to click on. Within these links there is a virus called the Trojan horse virus. The Trojan horse virus is not your typical virus. This virus will only attack your computer when the user activates it. The user will activate the virus when a program or software is clicked on our downloaded. Once it is downloaded, the hacker that created the virus will have access to your PC.
The Trojan horse virus infects your computer very silently. Many PC owners don’t even know that it is on their computer until it is too late. A normal virus that you typically see on a PC will start to affect the PC right away. The virus will also duplicate and harm more than one file at a time on your PC. After that happens, locating the source of the virus will become a much harder challenge to fix and repair. The Trojan horse virus infects your computer and will attack your computer. It will also open the door for other viruses to be welcomed onto your PC.
The Trojan horse virus got its name from Greek mythology. The virus is much like the story of the Trojan horse that was hollowed out and hid the Greek soldiers within the horse. Once the Trojan horse was inside the city walls, the attack began. The Trojan horse virus will do the same thing. It will not be welcomed onto your PC until you allow it to become a part of your PC.
Your PC will become infected a few different ways with the Trojan horse virus. The first way it can affect your computer is with an email that you may receive. The emails that you receive from people you don’t know that has a link attached will have a virus within that link. Once your click on the link, the Trojan horse virus will be installed onto your PC and the virus will begin to take effect on your PC.
The most common way that the Trojan horse virus will attach to your PC and infect your PC is through the different websites you browse through. As you browse through websites on the internet, different pop ups will appear that you may click on. Within these different pop ups a virus may be attached. The Trojan horse virus will use these different pop ups to attach or “piggy back” to. As the download completes, the download will also download the Trojan horse virus onto your PC.
Before you click to download a program or click a link, research the download and the link before you accept it onto your computer. Contact the company that is supplying the link to make sure the link will not damage your computer with a virus. You can also Google the link or do a search to see if the link has been associated with any viruses, such as the Trojan horse virus.
Trojan Horse Virus and Your PC