Computer Security and Trojan Horse Programs

Read this tip to make your life smarter, better, faster and wiser. LifeTips is the place to go when you need to know about Email Security and other Internet Safety topics.

How can I protect myself from viruses and Trojan horse programs?

Computer Security and Trojan Horse Programs

You've probably heard of a Trojan horse, and we don't mean the large wooden horse in ancient myth. This one damages your computer security. Unlike a virus that deletes files or JavaScript that sends e-mail to everyone in your address book, think of a Trojan horse as a remote-control tool. It quietly sits in the background, waiting for you to go online, and for the hacker to load it. You can infect your system with a Trojan horse by clicking (and thereby executing) an e-mail attachment that contains the Trojan horse software.

   

Comments

Nobody has commented on this tip yet. Be the first.



Name:


URL: (optional)


Comment:


Not finding the advice and tips you need on this Internet Safety Tip Site? Request a Tip Now!


Guru Spotlight
Sherril Steele-Carlin