A trojan virus uses multiple ways to spread over the Web and replicate itself. That's why if you want to know how to remove the trojan virus, you need to be aware of the ways it infects target computers.
- Through email attachments. Probably the oldest method of mass distribution, it has grown into a new industry of virus propagation. Modern sophisticated software, dedicated servers, large networks of already infected personal computers are used to send out gazillions of spam emails each and every day. A trojan virus may be attached as a greeting card, wallpaper, animated image, screensaver. Many of them have subjects with "hi, here's a greeting card for you!" words.
- Once downloaded and executed, a trojan may use the address book to send itself to other computers. That's why it is still worth noting that emails from unknown addresses should never be opened.
- Trojans widely exploit messaging software, especially popular programs like MSN Messenger/Live Messenger, Yahoo! Messenger, Skype, etc.
- Trojans may be included into bundles of emoticons for email clients and instant messengers alike.
- Modern Trojan viruses widely exploit security breeches in Windows Operating system and the popularity of multimedia content available online. For example, zlob trojan, responsible for aggressive distribution of over a hundred of fake antispyware programs, used video codecs to install onto target computers. Whenever a surfer visited a website with embedded malicious code, a window would pop-up asking to install a video codec in order to display a movie. Once the visitor clicked to agree to installation, trojan Zlob infected the system immediately.
A Trojan Virus generates fake alerts]
Trojans and Rogue Security Software
Trojans have gained an even worse reputation because of rogue security software which they distribute. Rogue software are bogus programs that pretend to look and act like antivirus or antispyware applications, various system maintenance tools, registry cleaners, etc. They use fake malware scan results and persistent pop-ups trying to scare the user into paying for a "full version" of the program. However, even getting a license key in exchange for some $30 or $100 changes nothing in the way rogue security software behaves. Even annoying pop-ups continue to appear on the desktop at same intervals.
I believe many people became more aware of Web threats thanks to rogue programs, because they got interested in the nature of this phenomenon, which led them to learn something about how to remove a trojan virus.
source: hubpages.com
I believe many people became more aware of Web threats thanks to rogue programs, because they got interested in the nature of this phenomenon, which led them to learn something about how to remove a trojan virus.
source: hubpages.com