Distinguish Trojan and virus, and the method of recognizing and preventing Trojan

Source: Internet
Author: User

The General people do not understand the virus and Trojan is what is going on, even if the computer knows a lot of people do not necessarily know the difference between Trojans and viruses, usually we collectively called Trojan "Trojan virus", as if the Trojan is a virus, Trojan and virus is one thing, in fact, if the Trojans and viruses have similarities, They are in the same place is that there are a number of computer programs, and in some programs, have some damage to the computer, but there is a difference between them, here I would like to introduce the difference to you:

(1) Virus heavy damage, damage your computer hardware and software, your computer system, or files, and the horse's center of gravity is control, that is to say control your computer, as to say whether the control after the damage, that is another thing;

(2) A wide range of viruses, access to the computer system is not easy to identify and search, while the Trojan is relatively latent in the background, or embedded in a certain program, or binding in other documents, but experienced computer users according to some symptoms or better find the identification. Below I put how to identify and prevent the Trojan method to inform everyone:

Tools/raw Materials

Follow the steps without the tools

Only Windows systems, Linux or UNIX, etc.

Steps/Methods

First look at your letter or folder there is a certain or some of the sudden set up to share (of course not you set up), because sharing is some hacker to pass the Trojan must be means;

To see if one or more EXE files are suddenly generated in the root directory of each letter, you can execute the file. Because the Trojan to run, first of all must be made into an executable file;

Review the process of your computer's task management (Ctrl+alt+delete to open task management at the same time): Are there any processes that you don't know or have never seen before, because running a program in accordance with how the computer works will definitely open one or several processes. For the suspicion process, it is likely to start the Trojan;

Of course, for the performance of the machine is not too high, the simplest way to identify Trojans is the computer suddenly in a very slow day, it is possible that your computer is controlled, that is, your computer in the Trojan Horse, launched the Trojan program.

Attention matters

Once you find an illegal shared letter or folder on your computer, quickly remove the share

Once you find one of your disks. Fugen directory (especially c: disk) There are some strange executable files, cut the random click, because if the inside is a Trojan file, a click of the Trojan is running, if the Trojan did not kill, that is, the anti-virus software can not be sensed.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.