Got an Interesting Trojan. TR/Crypt.ZPACK.Gen
Now I know how to remove this Trojan so please do not post about removal. I simply wish to gather knowledge on the trojan. Such as where does it come from, and how does it travel? How does it infect/destroy? If you can answer any of these questions please do. Also yes I know this does not really pretain to this forum. However, I know this is a large community that is very knowledgeable that is the reason I am posting here. Help me out fellow Geeks!1 person needs an answerI do too
October 18th, 2010 11:14am

Hey BakaRed77,Trojan is a malware that appears to perform a desirable function for the user prior to run or install but instead facilitates unauthorized access of the user's computer system. "It is a harmful piece of software that looks legitimate. Users are typically tricked into loading and executing it on their systems"It isa malicious program that cannot replicate itself like the computer virus but can cause serious security problems. It appears as a useful program but in reality it has a secret code that can easily access your system.FUNCTIONS OF TROJANa)It creates backdoor to your computer which allows the hacker to do anything on your system or we can say that the hacker will get control on your system without your permission. He can see your e-mails, record keystrokes, access password protected accounts and can get any type of information about your computer.b) It can do malicious functions like rebooting your computer or deleting files.c) It also installs spyware which takes you to the unwanted sites.d) Some annoying Trojans can change desktop or add silly active desktop icons.HOW TROJANS CAN SPREADa. Hidden in programsb. Through e-mailsc. Chatd. Image filese. Operating system vulnerabilitiesHOW TO PROTECT YOUR COMPUTER OR FIGHT AGAINST TROJANa) Almost all antivirus software and some antispyware programs can detect and remove the Trojan. Always keep your antivirus up to date for better protection. If no Trojan is found even after the scan and you still think that your system is infected by a Trojan then you can verify this from an expert.b) Do not download anything from unknown person or suspected site about which you are not 100% sure.c) Always use caution while opening an email attachment even it is from a known person.d) Do not receive files during the chat from an unknown source.e) Firewalls will also protect your computer from Trojan because it looks over the open ports of your system for incoming data. It will either block or let it pass according to the choice of user.Regards,Savan – Microsoft Support.
Free Windows Admin Tool Kit Click here and download it now
October 19th, 2010 3:56am

This topic is archived. No further replies will be accepted.

Other recent topics Other recent topics