Computer and virus.

Now Internet is being a common option to know many unknown things and to communicate with our relatives who stay in distance through many social communication site. Multinational companies use the net for teleconferencing and to promote their products. Net banking, face book daily shopping's are very common use now a days through net. Students are using it in their studies . There are many other uses of Internet in our daily life. A common problem in using net is virus and mail ware. Hackers are throwing many virus in net daily ,due to which all small and big users are in a great stress regarding this. Even general users are also in thought due to this virus and malware.

How is it affected?

We are downloading many components daily through net. It may be any software or, educational matter or any form of interview, songs and movies. When it is done ,without our knowing many virus and mail ware is coming and also downloading in computer. If the computer once affected then it may not run further and from distance the unknown hackers may control your personal computer and will be able to know all subjects regarding your computer.

Thus the hackers are doing many illegal work and damaging your computer and even mobile also. The another name of this virus is Trojan.

TROJAN-what is it?

Experts are saying the term "TROJAN" came from the Greek work. In Greece history the name is related with the troy war. At that time a wooden horse was made and filling with soldiers ,it was send to the place of enemy. They thought that the opponent accepted the defeat and then enemies thought it might be a gift. They accepted the horse and took it in their area. Then the Greek armies came out from that horse and defeated them with a great horror. This horse was called TROJAN. 

The name of this virus may came from that horse name and tactics. This malware also acts like that, it enters in your computer silently and helps to transfer all data's to sender and damages the users computer.

We used anti-virus to protect our computer and the branded anti-virus companies are in great thought to resist it. It is quit impossible to know ,from where it is coming as the users are changing their domain name continuously. It is attacking not only big companies but affecting many social organisation, even they are using it to know many Government secrets.It is creating problem in banking service mainly in ATM and net banking. 

Not only computer, smart phone , digital television, printers, many electronics and electrical components are affected due to this virus.

Some tips to protect TROJAN.

  1. Use genuine operating system and it must be up to date.
  2. Use firewall and and genuine anti-virus software . Be sure that when you will download any or opening your mail ,it must be scanned automatically. It will block any unwanted virus or mail ware and will protect the compute.
  3. Be sure that your anti-virus protection is updated.
  4. Don't open any unknown email and don't download any unwanted software.
  5. Keep your personal computer with password protected and don't share it with any.
  6. Keep regular maintenance using defragnation and disc clean up tools.

So be alert regarding this TROJAN virus. It is a new threat to computer world.

Like it on Facebook, Tweet it or share this article on other bookmarking websites.

Comments (0)

There are no comments posted here yet

What do enjoy the most out of the following in your spare time, if you have any?

What do enjoy the most out of the following in your spare time, if you have any?
No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 5 answer(s).
[{"id":"22821","title":"Write an article\/blog\/read a book","votes":"29","type":"x","order":"1","pct":34.94,"resources":[]},{"id":"22822","title":"Chat with friends online\/over a phone","votes":"13","type":"x","order":"2","pct":15.66,"resources":[]},{"id":"22823","title":"Go to sleep","votes":"11","type":"x","order":"3","pct":13.25,"resources":[]},{"id":"22824","title":"Watch a movie\/listen to music","votes":"24","type":"x","order":"4","pct":28.92,"resources":[]},{"id":"22825","title":"Sit and laze around and do nothing","votes":"6","type":"x","order":"5","pct":7.23,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
bottom 200
No married couple wants to end up getting divorced. It is not like they have planned for it. They try to put up with their partners for as long as they
Due to our modern lifestyle, we feel that digestion related disorders are a common problem. Thus, we neither give importance to them nor seek any help
The bond of marriage brings the two people together. Initially, everything may seem okay and both of them slowly start discovering each other in the journey.
Internet A Growing Need of our Nation, Internet is best option to learn, enjoy, and even earn from it. Internet help students in their studies, a mother
Introduction:  The very word, “cyber crime” has several distinctive connotations for system administrators who deal with a sense of sophistication
Ethical hacking and its opportunities Ethical hacking means hacking a system or a website for to understand the security weakness in order to make the
How to stay secure? We hangout with laptops and smart phones on a daily basis. Every right implies a responsibility. Every opportunity is a possession
How is cyber crime actually defined?: A notorious hacker is seating in somewhere at the outskirts of Russia or China with a laptop in his couch. He is