The General people do not understand the virus and Trojan is what is going on, even if the computer knows a lot of people do not necessarily know the difference between Trojans and viruses, usually we collectively called Trojan "Trojan virus", as if the Trojan is a virus, Trojan and virus is one thing, in fact, if the Trojans and viruses have similarities, They are in the same place is that there are a number of computer programs, and in some programs, have some damage to the computer, but there is a difference between them, here I would like to introduce the difference to you:
(1) Virus heavy damage, damage your computer hardware and software, your computer system, or files, and the horse's center of gravity is control, that is to say control your computer, as to say whether the control after the damage, that is another thing;
(2) A wide range of viruses, access to the computer system is not easy to identify and search, while the Trojan is relatively latent in the background, or embedded in a certain program, or binding in other documents, but experienced computer users according to some symptoms or better find the identification. Below I put how to identify and prevent the Trojan method to inform everyone:
Tools/raw Materials
Follow the steps without the tools
Only Windows systems, Linux or UNIX, etc.
Steps/Methods
First look at your letter or folder there is a certain or some of the sudden set up to share (of course not you set up), because sharing is some hacker to pass the Trojan must be means;
To see if one or more EXE files are suddenly generated in the root directory of each letter, you can execute the file. Because the Trojan to run, first of all must be made into an executable file;
Review the process of your computer's task management (Ctrl+alt+delete to open task management at the same time): Are there any processes that you don't know or have never seen before, because running a program in accordance with how the computer works will definitely open one or several processes. For the suspicion process, it is likely to start the Trojan;
Of course, for the performance of the machine is not too high, the simplest way to identify Trojans is the computer suddenly in a very slow day, it is possible that your computer is controlled, that is, your computer in the Trojan Horse, launched the Trojan program.
Attention matters
Once you find an illegal shared letter or folder on your computer, quickly remove the share
Once you find one of your disks. Fugen directory (especially c: disk) There are some strange executable files, cut the random click, because if the inside is a Trojan file, a click of the Trojan is running, if the Trojan did not kill, that is, the anti-virus software can not be sensed.