Recommended To Read:

What data recovery tools to buy if you want to start a data recovery business?

Free video data recovery training on how to recover lost data from different hard drives?

Where to buy head and platter replacement tools at good prices?

Data recover case studies step by step guide

I want to attend professional data recovery training courses

Trojan Horse: A Worm which pretends to be a useful program or a Virus which is purposely attached to a useful program prior to distribution. Trojan Horse is the Same as Virus or Worm, but also sometimes used to send information back to or make information available to perpetrator.

Vulnerabilities: Unlike Worms, which self propagate, Trojan Horses require user cooperation Untrained users are vulnerable.

Prevention: User cooperation allows Trojan Horses to bypass automated controls User training is the best prevention method.

Trojan Horse Prevention Tips:

* Have antivirus software installed on your computer, remembering to keep it up-to-date.  You’ll be pleased to know that most antivrus software does this automatically.
* Install anti-spyware software.
* Install a personal firewall.
* Scan all email attachments with an antivirus program before opening it.  Fortunately, most antivirus software can be configured to automatically do this.
* That said, never open an email attachment from someone you don’t know.
* In fact, never open an email attachment from someone you know that is unfamiliar and/or unexpected, as their system could be compromised.  Rather, confirm that they indeed sent the email to you before opening.
* Avoid  using peer-to-peer or P2P sharing networks, such as Kazaa, Limewire, Gnutella, etc.  File sharing programs are notorious for spreading Trojans and other malicious software.
* Try to only download software from trusted and reputable sources, as they could be infected with malware, such as a Trojan.
* Never open instant message(IM) attachements from people that you don’t know.
* Keep your system up-to date with your operating system’s latest security patches  .For the latest Windows updates go to http://update.microsoft.com/
* Scan your computer for Trojan Horses using a free online Trojan Scanner.
* Use an alternatiive browser to Internet Explorer.  My personal favourite web browser is Mozilla Firefox.  An independent study, in fact, shows that, in 2006, IE users were vulnerable to online threats 78% of the time.  At the same time Firefox users were vulnerable to online threats a mere 2% of the time.

Data recovery Salon welcomes your comments and share with us your ideas, suggestions and experience. Data recovery salon is dedicated in sharing the most useful data recovery information with our users and only if you are good at data recovery or related knowledge, please kindly drop us an email and we will publish your article here. We need to make data recovery Salon to be the most professional and free data recovery E-book online.