In Greek mythology, Odysseus deceived the Trojans by allowing the Greek army to enter Troy’s infallible gates. His men turned one of their ships into a large wooden horse and presented it as a gift to all the soldiers inside. This tactic, beautifully portrayed by the Broad Pitt film Troy, is unfortunately used in the same way in the computer world. Trojan horses are programs that disguise themselves as harmful. They do not recreate themselves, they do not destroy your data, they do not seem to do anything. Do not be fooled. Trojan horses do their dirty work like mythical Greeks by being “inside man” – they will deactivate your firewall security, open ports for botnet masters to turn your computer into a ploy, and download installation packages for them , Or they will invite key loggers to steal your personal information and send it to the Internet for people who use the information to do you unnecessary harm. Many Trojan horses, like phishing attacks, rely on the human side of security to work. You will see a pop-up ad (like a high school class reunion search engine or something to clean your computer of viruses and spyware) and click on it. Or you may receive a link to a video from a friend or email attachment claiming to be a patch to protect your computer from viruses. As always, the best way to stop this is to never click on the attachments of people you don’t know and don’t trust. Never download something you are not particularly looking for in a legitimate application directory (such as http://tucows.com). If you have no legitimate reason to trust any email from someone you do not know, always assume that you are a spammer who is trying to harm you. Activating Trojans is never a good thing – they run rougher than all your data. They can delete things, install other programs, infect your computer and steal your personal data, send it to fraudsters and thieves. Most operating systems have regular security updates. Make sure you update your installation regularly – Windows Automatic Update It is a good idea to keep your machine active. Ensuring that your computer works with a user account will give you better protection than an account with administrative privileges. Many Trojans need those administrative privileges to install themselves, and having a separate admin account that you use to install the software and a user account that you use is a good mechanism to stop the Trojan (this is the default on Macintosh and Linux systems, and so much malware on those platforms The main reason for not holding.) Always be careful, if you have one, use a firewall to protect your computer – even software like ZoneAlarm will do the job. Firewall Trojans close ports (the way your computer communicates with other computers) that are common targets and communication channels for their dirty work.