What Are Trojan Horses And Worms?

Trojan horses and worms

What Is Meant By ‘Trojan’ And ‘Worm’?

Trojans and Worms are small unwanted programs which hamper the performance of your computer to a great extent.

But what do Trojans and worms actually do?

Trojan horses and worms

Trojan horses and worms

These are designed to retrieve your confidential information from your computer which includes your passwords, bank account numbers, credit card information etc.

Trojans do no spread whereas worms replicate vigorously and capture all the information available on your system.

People who are new to the Internet, and sometimes even experienced users, download some strange and dangerous files which then turn out to be Trojans and Worms.

The Klez, I LOVE YOU and SirCam viruses are few such examples.

Trojans can also be carriers for different viruses so they can be termed as WRAPPERS too.

On the other hand, Worms are small programs designed by programmers to capture the email IDs of  those they ensnare which they then usually sell to advertisers for the purpose of marketing their products, so they replicate very quickly.

Once you think you have found any Trojan or Worm on your computer, I strongly advise you to use a good antivirus program to scan you computer in order to terminate their activities.

You must also make sure that the antivirus program used by you is updated on a regular basis.

Prevention Measures To Keep Your Computer Clean From Trojans And Worms

Trojan.IrcBounce, IRC/FinalBot, WinHelp.a, VBS.Stages, love-letter-for you.txt.vbs,  MyPicture.bmp.vbs are some of the most dangerous Trojans and Worms.

But by staying alert and by following preventive measures you can keep your computer system safe from harm.

Below are some tips that will allow you to avoid Trojans and worms:

  • Most importantly, always use a good antivirus program which would let you know whenever a Trojan or Worm enters into your computer and then ensure it’s removal.
  • Always scan any email attachments you receive before downloading or opening them, even if they are sent by your friend. This is the reason that all email services provide in-built antivirus scanners.
  • Only use reliable and trustworthy sources for downloading files. You need to be careful while you are downloading the files such as .EXE, .COM, .VBS, .BAT, .HLP and .DLL.
  • Always use a strong and healthy Firewall. Many Operating Systems do provide their own Firewalls but using an external Firewall typically ensures better security and safety. It enables you to keep a check on the applications using your computer resources.
  • Completely avoid using insecure Peer to Peer networks.
  • Always delete your Temporary Internet Files, Cache and Cookies whenever you finish browsing.

Play Safe To Stay Safe!

About Lee Munson

Lee's non-technical background allows him to write about internet security in a clear way that is understandable to both IT professionals and people just like you who need simple answers to your security questions.

Trackbacks

  1. […] A Trojan infection on your computer uses a similar methodology. […]

Speak Your Mind

*