Meet the Guide Editor
Trojans Contributors

Guide to Trojans - Trojan Horse Malware

Trojans are pieces of malware which install on your computer without your knowledge. A Trojan, or Trojan Horse, is installed along a seemingly legitimate program which performs a desirable function. Often, Trojans are inserted into these programs by hackers and then made available by means of free download or file sharing.

The malicious purposes of Trojans vary greatly. They can spy on your password or PIN numbers and phone home for example, yet the only common denominator for these pieces of malware is that you didn’t want to install them, are likely unaware of their presence, and that they carry out some malicious or dangerous action on your computer.

Here you find all you want to know to prevent Trojans or get rid of them including the best tools and free software.

Trojan Horse

Image Credit: Mark Muller

Latest Articles on Trojans
A Guide to Curing Your Computer Virus Infections

Are you looking for help with computer virus problems? Bright Hub has the answers. Use this informative guide to assist you in curing a variety of viruses, worms and other infectious...

Guide to Removing Malware Infection in Windows and Mac Computers

Did an antivirus or anti-malware program in your computer fail to protect your system from malware? Find out how to clean the computer using this guide to removing viruses, Trojans...

Trojan Removal Methods

Don't let Trojans infect your computer with their poisonous payload - take action now!...

A Guide to the Solar System

Planets and planetoids, asteroids called Trojans and Centaurs, dwarf planets and plutoids, meteors, comets, extra terrestrial volcanoes and volcanoes made of ice! Moonscapes beautifully...

Most Popular Articles on Trojans
  •  
    The Pros and Cons of File Sharing

    File Sharing is not itself illegal, especially if used to share files that you actually created and own or collaborated on. Like any medicine, if you abuse the usage, it becomes illegal. Read this article...

  •  
    Hidden Files and Folders Won't Change: Trojan Virus Problems and Fixes

    One of the actions by Trojan horse is by modifying settings in Windows. An example is by hiding itself or the location where it's hiding. If folder options in Windows shows hidden files and folders...

  •  
    Remove Google Pop Up Virus

    Google pop up virus, Google blank search or Google redirect virus is caused by a Trojan infection. DNSChanger, TDSS or Alureon Trojans can modify your internet settings, router or modem. Find out how to...

  •  
    Ethical Hacking: Understanding the Benefits, Goals and Disadvantages

    Have you ever thought that hacking could be ethical? It can be and is widely used. Read on to learn about what ethical hacking is, its benefits, disadvantages and uses....

  •  
    How Do Computer Viruses Spread?

    So you got a computer virus. But how did you get infected? How do they spread, exactly? Computer viruses are complex, and there are many types that can spread in various ways. Let's examine...

More About Trojans
10 Common Intranet Problems

In your Intranet, common problems may be the order of the day, If you thought you were alone then you are not. These problems are quite common in the wider scheme of things. Here I...

Reducing Threats to Computer Security: Fire, Theft, and Other Physical Dangers

Computer security can be compromised more easily by physical dangers than by online dangers....