How to be protected from a Trojan virus

How to be protected from a Trojan virus

Protection against viruses and Trojan programs is actual for all users of the Windows operating system. Even very good anti-virus program with daily updated anti-virus bases is not capable to protect from theft of confidential information with guarantee. But it is possible to reduce considerably risk, conforming to rather simple rules.

The sponsor of placement P&G Articles on the subject "How to Be Protected from a Trojan Virus" As work anti-virus programs How to pull out updatings How to update Nod 32

Instruction

1
Never work on the Internet without firewall (fayervol) and the anti-virus program. Adjust an antivirus on automatic updating of bases, instead of a firewall of Windows install the program from the third-party producer. Do not seek to get popular fayervol, more reliable protection will be provided in this case by less known program. Hackers well know, what firewalls are most popular, and "learn" Trojan programs to bypass them. The built-in firewall of Windows in this plan appears the most unreliable.

2
Trojan programs, in most cases, get on the computer with the files downloaded from the Internet, upon transition at the unchecked links and at visit of the infected Internet pages. Do not trust files from doubtful sources, very many of them are infected with trojans. Do not follow the links in letters from strangers. In due time update an operating system, it will allow to close the revealed vulnerabilities.

3
Surely include display of extension of files. Open any folder or a disk, pass further: "Service – Properties of the folder – the Look". Remove a birdie from the option "Hide Expansions for the Registered Types of Files". Working with files, always look at their expansions, they have to correspond to types of files.

4
Sometimes harmful executable files mask by office of expansion on behalf of the file a large number of gaps. Thus the user, it seems, sees, for example, the file of the photo: foto.jpeg … …. (it is a lot of gaps) .exe. The false jpeg expansion misleads, the real .exe expansion hides abroad windows. Opening similar "photo", the user starts the executable harmful file.

5
If you suspect that the Trojan program after all got on your computer, try to find it independently. First of all, you need the good program for viewing of the started processes – for example, to AnVir Task Manager. She allows to see the list of processes, names and location of executable files, their keys of start.

6
Start the program, open the list of processes. Dangerous and suspicious processes will be allocated in the list in the color. Define, what programs possess these processes, it can be made, having looked at a way to the executable file. If necessary stop dangerous processes, remove their executable files and keys of start in the system register.

7
Some Trojan programs, so-called bekdor, allow the malefactor to operate your computer far off. The server part of such program is on the computer of the victim, client – on the hacker's computer. Thus the server part "hangs" on some port, expecting connection. To check, whether there are no similar connections at you, open a command line: "Start-up – All programs – Standard – the Command line".

8
Enter in a command line the netstat team – aon and press Enter. Before you there will be a list of all Internet connections. In the column "Local Address" you will see the local addresses and ports opened on your computer. In the column "External Address" ip-addresses to which connected will be specified or your computer is connected at present. Current state of connection is reflected in the column "State". In the last column – PID – are specified identifiers of processes.

9
To learn, what program opens this or that port, gather in the same place, in a command line, the tasklist team. You will see the list of all processes with their identifiers. Having looked in the list of connections of PID of suspicious process, find this identifier in the list of processes and look, to what program it belongs.

10
Close dangerous processes, having entered in the command line taskkill / pid 1234/f and having pressed Enter. Parameter f is necessary for compulsory completion of process, instead of "1234" enter the identifier necessary to you.