Do you remember the Greek mythology story of the Trojan Horse? The Greeks hid inside a large, wooden horse and after the Trojans fell asleep the Greeks got out of the horse and killed the people of Troy.
A trojan horse in computers hides in your computer stealing information such as browsing history. Trojans are usually piggybackers. They come in as a "helper" to another program. For example, youtube can be a dangerous place if you are not on your toes! A "plugin" may be "required" for certain videos. That's a red flag to investigate what is trying to install on your computer. Some plugins are legitimate and helpful, but you have to research everything you want to install on your computer otherwise you might end up with some things coming out of your computer that you would like to remain private.
Running scans often is a necessary part of using a computer. If you use a dish or cup, you must wash it. If you use a computer you must run scans. If you are sharing a computer with more than one person, don't assume he/she is scanning the computer. Be proactive and do it yourself that way you know it is done.
See: Superantispyware to download a free version of Superantispyware.
No comments:
Post a Comment