Though trojans and viruses are frequently mentioned when dealing with network and computer security, the terms are often interchanged for one another. An innocuous-looking program like a free screensaver that can bring your computer crashing around you is called a trojan. Trojans were named after the Trojan Horse of mythology, when the Greeks pretended to retreat because they feared the wrath of a goddess, leaving a wooden horse as their offering. The Trojans rejoiced and let the horse in, not knowing that a few of the Greeks were hidden inside the horse. In the dead of the night they crept out and attacked the city. That sums up how trojans work. Though it seems like an innocent and useful application or file, these programs would have malicious code hidden inside it. These usually come masquerading as a legitimate attachment or a game file you’d want to download. and they work once you open them.
Trojans are broken down by how they breach the system and how much damage they can cause. Some can be harmless, changing your wallpaper or colors. Others can gain access to your information through keylogging or corrupt your files without your knowledge. A backdoor trojan, for example, will open a way for a malicious attacker to gain access to your computers. The main difference between a trojan and a virus is how it’s distributed. Though a trojan can be sent to multiple targets, as long as it isn’t open it remains inactive.
Trojans are usually transferred through these means: as e-mail attachments, through websites, or file-sharing networks. The simple precaution of not opening e-mails with attachments, even those from your friends and associates, can keep trojans away. Pay attention to the extensions of these attachments, They could be masquerading as image files but are actually executable code. Last, if you find a file that seems useful, check online if it’s legitimate and real. Never download applications if you’re not sure about where it came from.