What is a Trojan?
The Trojans derive their name from the Trojan horse: As a beneficial application disguised by a malicious program sneaks on your machine. The camouflage is mostly about inconspicuous file name, for example, are named after system files. Many users thus do not know that your Computer is infected by a Trojan. In General, Trojan to spy on the target, passwords and similar data, or your Computer for illegal purposes remotely.
So you can detect a Trojan
- In order to detect an active Trojan on your Computer, you should check first of all the running processes. Because of the built-in Windows task Manager, under certain circumstances, some processes does not display, grab this on a more extensive Alternative such as the free "System Explorer" back. In addition, you can forward suspicious processes directly out of the program for Review. Suspicious, especially those processes that have a high CPU utilization are.
- Then, check the Internet connections on your computer. Use the program "TCPView". It lists not only all of our Connections, but also shows which process has started. If a suspicious event is found, the process then again in more detail in the "System Explorer" to view and test.
A virus protection increases security
Virus protection Software can take a lot of work in the case of the Trojan removal and Computer in addition, before a new or first infection protect.
- Free anti-virus packages such as the popular "AntiVir", "avast Free Antivirus" and "AVG Free Antivirus 2013" offer you all a full virus scan of the entire system as well as useful additional functions. For example, you receive in your Internet browser security information about the Website visited. However, these virus protection programs are not Trojans specialized, but General anti-virus programs.
- More security from Trojans you have with a special Anti-Trojan Software. Of the "Trojan Remover" discovered the pests reliably and removes them. In addition, the Trojan can correct Remover may have changed system settings.
Known Trojans are, for example, in the GVU , the GEMAor the BKA-Trojan. The linked article will explain how to remove this Malware, respectively.