Avoiding Sub7 Trojan Downloads
You should be aware of the many ways in which a Trojan can find its way onto your PC. While basic security isn’t taught in the manual of your desktop or laptop computer when you unpack it, there are certain things that you need to know from the start.
A Trojan horse (and indeed any malicious software) can infect from a range of sources.
For instance, it might come via an email as an attachment. With a modern email client and/or a suitable email inbox scanning utility you should be able to detect a Sub7 Trojan download before it becomes active.
Many Trojans infect PCs by being bundled in with a seemingly innocuous download from the web. It might be found in a piece of software from a popular download site or from a P2P filesharing network. If you use these types of services, you should employ online scan tools and the most recent version of your favorite browser to check for malware, as well as a peer-to-peer data checking utility such as PeerGuardian. Updating your browser should also protect you from being infected by the Trojan via exploits in older versions.
Before the Internet became a part of so many people’s lives, Trojans commonly found their way from computer to computer via removable media such as a floppy disk or CD, as well as USB Flash sticks and external hard disk drives. They might also infect PCs by hiding on a network drive within a corporate environment.
(Image by author)