Friday, October 29, 2010

How To Remove a Trojan Horse from Your Computer

Trojan horses are viruses that sometimes reside in your computer.  Computer viruses like these occupy your computer's virtual memory and hard disk space. Trojan horses can be acquired via the Internet without the end user's notice or approval. 
Most of these Trojan viruses are self-installing, and they infect your system anonymously. Some of these types of irritating viruses actually replicate themselves after installation.
And the worst part here is that Trojan horse viruses gather all information available from your computer and send the collected data to a remote server (a computer located in an untraceable area and possibly the owner or the creator of the virus).
If you are one of the victims of these "nasty horses", likely you cannot maximize your system's performance, especially when the programs you operate frequently access the Internet. 
Here are some of the methods that you can use in detecting and eliminating these annoying computer viruses, which could eventually damage your computer or worse lead to identity theft:
First, you have to detect if your acquired computer virus is always active or not. You can try detecting the virus by pressing the (ctrl + alt + delete) keys on your keyboard to access the task manager window on your desktop screen. Then click on the processes tab to see if there are any suspicious processes that your computer is running. Compare the processes present on the list against those provided by websites that focus on eliminating viruses.
  • If those suspicious processes are proven as positive viral operations, or if you still cannot determine if the processes are run by viruses, then it is time for you to purchase registered anti-virus software. Anti-virus software is mainly sold for scanning for viruses and spyware, and eliminating malicious software. These also protect your computer from future infections caused by downloadable computer viruses.
  • After installing the anti-virus software, you may set the specified configurations from the manual and thoroughly scan the system's storage and virtual memory for possible viral infection.
  • After detecting a Trojan horse virus, delete the file using the anti-virus program. If the infected file is a system file, which is being used by your computer's operating system, you can quarantine the infected file so that the virus will not affect other programs or data in the system.
  • Restart your computer to refresh the system, and check if the system's performance increased. It would be best if you run the anti-virus scan again just to be sure that there are no traces of the existing Trojan horse virus.
  • Note that anti-viral programs need to be updated so that your computer is always protected from Trojan horse viruses.

No comments:

Post a Comment