Every day we visit dozens of sites,several times a day we check mail, chat in ICQ and download megabytes, if not gigabytes, of information from download sites. At the same time, we absolutely do not think about that, together with the program we need so much, we pick up the so-called viruses. More often than not, the problem of "infection" of the computer faced by novice users, so this article for them will be especially interesting and useful. And we'll talk today about a computer virus, which is not a virus at all. "Trojan" is a system of remote administration, that is, a program hidden from the user's eyes and executing commands of its creator.
Probably, many now have asked a question about that,why "trojan" does not apply to viruses. Everything is very simple. The principle of computer viruses is similar to biological viruses. The only difference is that biological cells damage the body, and virtual ones - system files. Simply put, it is capable of self-reproduction and has destructive functions. This refers to the term "virus". "Trojan" is deprived of the "ability" to multiply, while infecting the rest of the files. However, it is customary in the people to refer the Trojan program to viruses.
So, we figured out what it is and how the Trojan virus gets into the computer. What does this pest do with our system? How to deal with it?
Speaking of the first question, it will be fairto mention why the virus "Trojan" is called so and nothing else. The name is closely related to the legend of the Trojan horse, with the appearance of which came a turning point in the battle for Elena the Fair. If you remember, a huge wooden horse was an inoffensive gift to the Trojan prince, but as soon as the gates of Troy opened, the main troops of Sparta, getting out of the horse, attacked the fortress.
It also happens in the computer world withTrojan horses. We download them under the guise of completely innocuous programs, but as soon as they are launched, the Trojan starts spying on us: stealing passwords, sending out spam, stealing files, formatting disks, and so on.
Despite all this, understand that on yourcomputer installed a virus "Trojan", you can not always. For this purpose it is better to use specialized programs. They are capable of both curing the Trojan virus and blocking the installation of this seemingly innocuous program.
To date, the most reliable are recognizeddomestic antiviruses - Dr.Web and Kaspersky Anti-Virus. They do not stand on ceremony with the Trojans. This is not surprising, because we remember that the Trojan is a completely malicious program, so there's really nothing to treat there. As a rule, antiviruses complete the processes started by the Trojan program and delete their files from the hard disk.
On average, antiviruses are updated 3-4 times inday, and sometimes more often. But this does not mean that you will have to constantly sit on the developer's site and wait for these updates. Modern anti-virus databases are updated automatically with an active Internet connection. All you have to do is check your computer at least once a week for spyware and enjoy your work!</ p>