One is more likely to get trojan horse in a PC as at first glance it appears as a useful file that probably the user itself has downloaded from the internet. That what makes it so malicious that one can not tell any difference between a useful or a trojan file. Once this file is clicked on, installed, opened by the user get trojan horse in your computer without knowing. The reason they appear to the user as a useful file is to convince the user to open it so that it can install itself over the computer. Some Trojans might be very nasty while others are just very annoying as all they do is deleting important files from your hard drive, changing the desktop or showing useless icons over the desktop and it does not help deleting them off as they keep coming back. Apart from their annoying behavior Trojans unlike worms or viruses do not reproduce. The seven main types of trojan horses that an internet user is most likely to get affected from are listed below:
•Remote Access Trojans: it is also called as RATs which offers the hacker fully access to your computer leaving your computer vulnerable to the attackers out there.
•Proxy Trojans: this might be very dangerous as it gives the hacker fully control and using your computer as a proxy server. Giving the attacker fully charge of conducting illegal activities from your computer.
•Security Software Disabler Trojans: As the name says for itself this trojan disables the anti virus firewall running in your PC without the user’s consent.
•Data Sending Trojans: Getting this kind of trojan gives the attacker all the private and sensitive information to him like your passwords, credit card number etc. or they could install a key logger in your computer and track everything the victim types.
•FTP Trojans: This allows opening the Port 21 which gives access to the attacker in your computer while using file transfer protocol.
•Destructive Trojans: This trojan delete files from your computers.
•Denial-of-Service Attack (DoS) Trojans: a DoS trojan takes down the network or your internet connection by sending useless packets to your IP address and flooding it.
When it comes to malicious software one cannot go online without a firewall installed in his/her computer. Get trojan protection software to keep your hard drive clean and safe. Incase of a broadband cable a firewall should always be running to avoid get trojan affected. Unknown files should be strictly avoided from opening or installing, even after downloading a file from a reliable source do check it with a virus/Trojan scanner to make sure its clean.