Hardware Secrets
Home | Camera | Case | CE | Cooling | CPU | Input | Memory | Mobile | Motherboard | Networking | Power | Storage | Video | Other
First Look
Gabriel’s Blog
Main Menu
About Us
Awarded Products
Manufacturer Finder
RSS Feed
Test Your Skills
Subscribe today!
Maximum Security: A Hacker's Guide to Protecting Your Computer Systems and Network, 4th Edition (Book and CD-ROM)
Maximum Security: A Hacker's Guide to Protecting Your Computer Systems and Network, 4th Edition (Book and CD-ROM), by Anonymous (Sams), starting at $0.47
Home » Networking
Protecting Your Computer Against Invasions
Author: Gabriel Torres 49,818 views
Type: Tutorials Last Updated: May 10, 2005
Page: 1 of 3
Trojan Horses

With the popularization of broadband Internet connection, more and more users have their Internet connection active during all the time the computer is on. Even if you are not in fact accessing the Internet, the computer is connected. This way, such user tends to be more worried about invasions than the users who access the Internet through dial-up connections or users who don't have access to the Internet.

To start with, it has to be understood that a hacker can only invade your computer if you "let" him/her do it. For instance, a hacker can only invade your computer using a backdoor like Netbus and Back Orifice if you have that type of program installed in the computer. That type of program transforms your computer in a server, making it possible for anybody in the world to invade your computer and read your files (with the appropriate tool, of course). But who is crazy enough to install a program like type in the computer? Nobody, of course. They usually come as "Trojan Horses", that is, disguised as cool screen savers that a friend (a friend?) has sent you. Luckily, now all antiviruses recognize and remove that type of program, hence the importance of having an updated antivirus program in the computer.

Pay attention because nowadays Trojan Horses come in fake e-mails supposedly coming from banks and stock brokers. For example, in you have a checking account on Citibank and receives a fake e-mail saying that you should update your data and provides a direct link to do so, you might be tempted clicking on the link or even installing the software that may have come attached to this fake e-mail. DON'T DO SO! This link or software will steal your passwords and banking data! This technique, also known as phishing, is becoming more and more popular.

The best piece of advice? Don't click on links nor install softwares that come from people you don't know. Since a lot of people nowadays know about phising, people behind these scams are now sending e-mails saying that someone you love sent you an e-card or something like that, asking you to click on the provided link for you to read the lovely message. Don't be silly, don't click on these links! It's a Trojan Horse!
But, besides Trojan Horses, what other type of procedure a common user may unintentionally perform which will let his/her computer become exposed to invasions? File sharing. Let's explain more about this.

Print Version | Send to Friend | Bookmark Article Page 1 of 3  | Next »

Related Content
  • Testing Your Computer Security
  • How to Build a Small Network Using a Broadband Router
  • How to Share Folders and Printers on Your Network
  • Intel LaGrande Technology Explained
  • How to Build a Network Using a Cross-Over Cable

  • RSSLatest Content
    ASRock FM2A88X-ITX+ Motherboard
    April 27, 2015 - 2:40 AM
    GeForce GTX TITAN X Video Card Review
    April 22, 2015 - 4:00 AM
    A10-7800 CPU Review
    April 6, 2015 - 2:50 AM
    Samsung Galaxy A5 Smartphone Review
    March 31, 2015 - 2:47 AM
    A10-6800K vs. Core i3-4150 CPU Review
    March 25, 2015 - 3:15 AM
    Core i7-5960X CPU Review
    February 24, 2015 - 3:00 AM

    2004-15 Clube do Hardware, all rights reserved.
    Advertising | Legal Information | Privacy Policy
    All times are Pacific Standard Time (PST, GMT -08:00)