Friday, August 15, 2008

Runtime Error and the Trojan Virus Explained

Most threats specialize in carrying out a display of pop-up tasks, the collection of user data, change browser settings and can be easily classified - they are spyware. However, there are still many other threats that cripple differently your PC and perform a variety of different actions and are therefore more difficult to label.

Mistakes are executing one of them. They are the most common Windows error message and infect the majority of computer users.

Their goal is to serve as a reminder that there are serious problems that occur in your system while a particular program is being "run". This is mostly due to the fact that there is a large number of software on your computer registry of the computer can not function at an optimum level because these programs are in conflict with each other due to errors execution.

A very few signs that mistakes are implementing infect your computer are:

1. Constant error messages

2. A lack of memory

3. Extremely slow start and

4. Slow PC

Another serious threat computer is the Trojan horse virus. These "Trojan horse" programs take their name from the legendary wooden horse that carried Greek soldiers hidden in the city of Troy. These poor performing computer programs feature hidden, often to useful applications still in effect, make Spyware Adware or functions, and / or allow remote access to your PC.

The problem of Trojans explained

If you read these lines, there is really a good chance that your PC is already infected with a Trojan virus. Trojan virus can be installed on your computer simply by visiting a Web site that is carefully designed by an attacker. When you visit the Web site, the attacker sends to your computer, the code that is designed to be executed on your machine using the vulnerabilities of the software installed on your machine or vulnerability in the operating system itself.

If your PC is infected, it can be used by the attacker to send unsolicited e-mail to email lists that the hacker has focused. These e-mails spam can not be attributed to the attacker, because they come from your machine. This is make your PC slow, and the attacker is using your Internet bandwidth for free. If you think your Internet usage is excessive, this May a contributing factor.

How do I get?

Trojan virus can be installed on your computer simply by visiting a Web site that is carefully designed by an attacker. When you visit the Web site, the attacker sends to your computer, the code that is designed to be executed on your machine using the vulnerabilities of the software installed on your machine or vulnerability in the operating system itself. Many pirates / torrent sites and pornographic sites often infect your computer with viruses, errors registry and malicious programs. DO NOT visit them or they'll visit.

How can I remove my computer

Many of these types of Trojan viruses once installed on your system will keep themselves reinstalling the start unless you've completely removed the virus from your system, including the system registry. Often, these viruses to connect to a server on the Internet without your knowledge, notify the attacker and reinstall on the system.

You must remove all parts of Trojan virus for a complete elimination of the virus. A good anti-virus will do.

For errors of execution, a good record set your own problem and at the same time increase the speed of your PC and return it to its original performance.

No comments: