Beware of Trojan Horse
Trojan horse is a form of malware in computing terminology. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer.
Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised.
If you found your PC behaves strangely (reboot, keyboard became undetected), it is recommended to spend some time to spot for trojan.
Common examples of damage are:
Allowing remote access to the victim's computer
Spreading other malware, such as viruses: this type of Trojan horse is called a 'dropper' or 'vector'
Setting up networks of zombie computers in order to launch DDoS attacks or send spam.
Logging keystrokes to steal information such as passwords and credit card numbers
Phishing for bank or other account details, which can be used for criminal activities
Harvesting e-mail addresses and using them for spam
Restarting the computer whenever the infected program is started
Deactivating or interfering with anti-virus and firewall programs
Randomly shutting off the computer
Methods of deletion and prevention
- run windows update, ensure your OS is up-to-date
- boot OS to safe mode
- clearing the temporary internet files on a computer
- finding the file and deleting it manually
- install anti-virus software, update signature file, do a full scan
- install anti-spyware programs
- install a software firewall. A good software firewall will protect your computer from outside attempts to control or gain access your computer, and usually provides additional protection against the most common Trojan programs or e-mail worms.