NOD32 - Save 25% - Download Now

Total Defense (former division of CA Technologies)

You are here: Home > Trojan horses > Information

Information

Most likely Trojan Horses are distributed within innocent programs that claim to provide better access, free time or viewing enhancements for on-line services. Trojan Horse programs are typically distributed via e-mail, and are sometimes embedded in .DOC or .RTF files; when the user double-clicks on these files, the Trojan Horse is executed and inserts itself into the user’s computer system.

From inside the files, the Trojan Horse is activated and can access passwords, screen names and other personal information and then automatically distribute this confidential data to
others.

Common Trojan Horse warnings:

  Advertising

DHL for You
Use 'DHL for You' for easy package sending in the Netherlands!


Save 10% off top Norton Products with Coupon Code 10NAMNORTONSTORE


Save now - 25% off - 2 year license of ESET NOD32 Antivirus 4


Save 20% on Trend Micro™ Titanium™ Maximum Security! Coupon Code: titanium20


Norton 360 Version 5.0 3 Year Protection


ZoneAlarm Internet Security Suite 2012 - Save 50%