Read this tip to make your life smarter, better, faster and wiser. LifeTips is the place to go when you need to know about Internet Security and other Internet Safety topics.
Trojan horse programs can be spread inside practically anything people find desirable, such as a free game, movie, song, etc. Firewalls and internet filters include Trojan horse blockers. Victims typically download the Trojan horse from a WWW or FTP site or got it via peer-to-peer file exchange or just carelessly opening some email attachment. Trojans usually do their damage silently. The first sign of trouble is often when others tell you that you are attacking them or trying to infect them.
|Jennifer Mathes, Ph.D.|