So if once a hacker can create a Trojan horse program then hacker can gain access to the computer by installing that in victims PC. The purpose of creating the program is to give the hacker the ability to steal the user's personal information, such as credit card numbers or passwords that the user enters. Hackers can also modify files locate on the user's computer and take the control of other softwares.
Feature and the two parts of a Trojan horse:
Client (the part that belongs to hacker).
Server (the part that belongs to victims).
Most Trojan horse programs have two parts. One part is called a server, and the other is the client. The server part is the one that actually infects and invades the victims computers. The client part of the program is the one that allows the hacker the ability to invade the infected computer. The hacker uses the client part to send requests to the server part when performing a scan on the Internet. When an infected computer is found, the server part replies to the request of client part from the victims PC, and then the hacker links to the infected computer (link between client part and server part in victims PC remotely thought Internet ) and invades it and takes the control the victim PC by using the client part.
So we can see that it is very easy to take control of a remote PC by just putting the server part of a Trajan horse in victims PC. But the main problems are here that the hackers have to face is the server part of most Trojan horses is detected by the victims PC Antivirus and the outgoing signals of server past is blocked by the firewall. So the hackers have to use different strategies e.g. encryption of the server part by various method e.g. hex codes editing to avoid detection by AV. And this encryption process is the most challenging part of hacking and thus hacking is getting tougher day by day. So if the hacker can make his server part undetectable in victims PC somehow (very tough) then hacking is very easy.
How to avoid becoming a trojan horse victim-
run a good firewall program such as Zone Alarm or like those outlined on the Firewall page of this website. Also, use software made specifically to sniff out trojans like The Cleaner and don't forget to keep it updated.
don't download an executable program just to "check it out" - if it's a trojan, the first time you run it, you're already infected!
be aware that downloading blindly from people or sites, whether you know about them or not, is risky.
you must be sure what the file is before opening it if you decide to open it at all
beware of hidden file extensions
if you have programs that give options to automatically open or get files, don't use them
don't be lulled into a false sense of security just because you run anti-virus programs-many don't check for trojans and you must constantly update them
keep up to date at Dark-e.com on the latest threats and how to keep them off your computer
Ways to get rid of trojans-
you may have to do a clean reinstall of your operating system or have someone do it for you
maintain and update a trojan sniffer like The Cleaner which can be run, finding the trojan, and usually cleaning it from your system.
use a commercial anti-virus software program
use a shareware anti-virus program
check sites on the net for help and instruction. (check the "Tools and Links" page)
load a good firewall program to tell you if someone is attempting to access your computer-check the Firewalls page for more.