; however, the online game account and password are also stolen. The gamer’s cyber assets are therefore stolen.
A trojan horse is a non-replicating program that appears legitimate but actually performs malicious and illicit activities when executed. Attackers use trojan horses to steal a user’s password information, or they may simply destroy programs or data on the hard disk.
A trojan horse is hard to detect as it is designed to conceal its presence by performing its functions properly.
Some recent examples are:
Trojan horses embedded into online game plug-ins which will help the online gamer to advance their game charactersTrojan horses are embedded into popular commercial packages and uploaded to websites for free download or to be shared across peer-to-peer download networks.
Trojan horses are particularly dangerous due to the fact that they can also open a back door into a system and allow an attacker install further malicious programs on your computer. Back Orifice and SubSeven are two well-known remote access trojan horses that allow attackers to take control of a victim’s computer.
>A worm is a self-replicating program that does not need to attach to a host program/file. Unlike viruses, worms can execute themselves. Worms have the ability to spread over a network and can initiate massive and destructive attacks in a short period of time.
Do Not Let Thieves Steal Your Notebook.
You have to protect your notebook computer from stealing. If your notebook is lost, you will lose those data that has not been backup. Your personal data or information such as your name, bank account, photos for family or friends and your own email address lists will also be disclosed to unauthorized persons or even be uploaded to the Internet.
Install and configure anti-virus software.
To protect your computer from virus and malicious code attacks, you should install and properly configure anti-virus software. Some new computers come bundled with anti-virus software, but the software is often a limited-time trial version. Check the terms and conditions of use. If your computer does not have any anti-virus software installed, you should buy some and install it before connecting to the Internet. For effective protection, you should update your software with the latest definition files, scan your computer and enable the real-time detection feature.
Do scan all email attachments for viruses before opening them, especially those files with extensions .exe, .com, .doc, etc.
To disable automatic processing of email attachments in your Internet email software.
Do consider controlling spam by using email filtering software that allows users to block or screen out spam using simple filtering rules.
Do use separate email addresses for different purposes whenever feasible.
A firewall enacts the role of a security guard. There are of two types of firewalls: a software firewall and hardware firewall. Each serves similar, but different purposes. A firewall is the first step to provide security to the computer. It creates a barrier between the computer and any unauthorized program trying to come in through the Internet. If you are using a system at home, turn on the firewall permanently. It makes you aware if there are any unauthorized efforts to use your system.
Install Antivirus Software
Antivirus is one other means to protect the computer. It is software that helps to protect the computer from any unauthorized code or software that creates a threat to the system. Unauthorized software includes viruses, keyloggers, trojans etc. This might slow down the processing speed of your computer, delete important files and access personal information. Even if your system is virus free, you must install an antivirus software to prevent the system from further attack of the virus.
Use Secure Passwords
The first line of defense in maintaining system security is to have strong and complex passwords. Complex passwords are difficult for the hackers to find. Use a password that is at least 8 characters in length and include a combination of numbers, letters that are both upper and lower case and a special character.
->If you receive an e-mail with an attachment and you’re unsure of the source, then you should delete it immediately. Don’t download any applications or executable files from unknown sources, and be careful when trading files with other users.
Internet can be a dangerous place if not used carefully.But by prevention and protecton, we can prxotect our important data to a large extent.
Hopes that this article helps you.