NOD32 - Save 25% - Download Now

Total Defense (former division of CA Technologies)

You are here: Home > Trojan horses > Information


Most likely Trojan Horses are distributed within innocent programs that claim to provide better access, free time or viewing enhancements for on-line services. Trojan Horse programs are typically distributed via e-mail, and are sometimes embedded in .DOC or .RTF files; when the user double-clicks on these files, the Trojan Horse is executed and inserts itself into the user’s computer system.

From inside the files, the Trojan Horse is activated and can access passwords, screen names and other personal information and then automatically distribute this confidential data to

Common Trojan Horse warnings:


DHL for You
Use 'DHL for You' for easy package sending in the Netherlands!

Save 10% off top Norton Products with Coupon Code 10NAMNORTONSTORE

Save now - 25% off - 2 year license of ESET NOD32 Antivirus 4

Save 20% on Trend Micro™ Titanium™ Maximum Security! Coupon Code: titanium20

Norton 360 Version 5.0 3 Year Protection

ZoneAlarm Internet Security Suite 2012 - Save 50%