Posts

Showing posts with the label Trojan Horse

IS USING INTERNET SAFE?

Image
Many people surf the Internet as part of their work activities, others visit a wide range of pages to stay fully informed of the news in the world, perhaps simply to complement their educational training or to entertain themselves during leisure hours. But everyone wonders if it is really possible to surf safely on the internet and that is precisely what this article is about. What Is Internet Security? Within the operating rules and policies that are part of the management of the websites to which users have access, a series of parameters have been established in order to prevent and control unauthorized entry to the resources available within Internet. This is part of internet security and its goal is to maintain a level that allows users to enter each page without risks to their computer or the integrity of their personal information. Therefore, talking about security is having ways to prevent, protect and avoid unauthorized intrusion to private networks, such as corporate or ev...

DIFFERENCE BETWEEN VIRUS AND TROJAN

Image
Viruses and Trojans belong to a group of threats that can enter your computer and seriously damage it or violate your personal data. The group, which also includes worms, adware, spyware or ransomware, is called malware. But, if you are not clear on the difference between a virus and a Trojan, keep reading, because in this blog we are going to explain it to you & we will tell you how to be stay safe from it using antivirus and other tricks. What Is The Difference Between A Virus And A Trojan? Although the names that each particular threat receives can generate some confusion and lead to think that everything is the same, it is necessary to know that there are great similarities, but also great differences between a virus and a Trojan. One of the similarities is that a virus enters a computer camouflaged within an executable file, a link, an apparent program. The Trojan accesses our PC in the same way. In other words, in both cases it is the same user who unintentionally activ...

BRIEF ABOUT TROJAN HORSE

Image
Let’s get a brief of Trojan, whether it’s a virus or malware and how to protect it using an antivirus About Trojans Beware of Greeks who bring gifts In Virgil's epic poem The Aeneid, a clever Greek military strategist named Ulysses devises a plan for his men to enter the walled city of Troy. Instead of destroying or scaling the city walls, Ulysses sees another way to enter: with a deception. Trojan soldiers watch as the Greeks appear to leave, leaving behind a giant wooden horse in surrender. Drunk after victory, the Trojans drive the horse into the walled city, only to discover that Odysseus and his men had been hiding inside the entire time. Like their namesake, Trojan horse attacks, or simply Trojans, use deception and social engineering to trick unsuspecting users into running seemingly harmless programs that conceal a malicious payload. How to Distinguish a Trojan People sometimes think of a Trojan as a virus or a worm, but in reality it is neither. A virus infects f...

Popular posts from this blog

HOW TO STAY UP TO DATE ABOUT KEEPING DATA SAFE?

IS USING INTERNET SAFE?

COMPANIES INTERNET SECURITY