Sunday, May 6, 2012

How To Prevent and Detect Remote Access Trojans

Wondering how to prevent and detect Remote Access Trojan's, also known as RAT's? RAT's, like other malware, are an all too real threat to your Internet security and privacy. This malware actually allows criminals to control your computer through your computers Internet connection. In fact, they can have even more control over your computer than you do. Cyber criminals use Remote Access Trojan's to remotely view and change your computers files and functions, monitor and record your activities, store files and programs on your computer, remotely turn on your own webcam to spy on you, and even use your computer to attack other computers. Having your computer infected with a RAT can lead you to having your personal information stolen; added to the ever-growing list of victims of identity theft, which happens to be one of the fastest growing crimes in all of the USA and Canada. Don't disconnect your computer from the Internet forever just yet. It is somewhat reassuring to know that there are some ways to help detect Remote Access Trojans (RAT's).

You definitely want to have anti-virus software installed on your computer to prevent and detect Remote Access Trojans, or any malicious software for that matter. It is important to remember to keep it up-to-date. Try to get into the habit of running a "full system scan" on a regular basis as well.

Have anti-spyware software running on your computer. Most Trojan Horses are detected with anti-spyware software.

It is a good idea to have anti-keylogger installed on your computer, as RAT's are often bundled with keystroke loggers; malware that secretly records every keystroke and even captures screen shots. Anti-virus and anti-spyware software alone do not detect all keyloggers. You need anti-keylogger software installed to detect and block keyloggers.

Have your computer guarded with a personal firewall. A firewall will keep hackers out and block any malware already installed on your computer, such as a Remote Access Trojan or a keylogger, from remotely sending your personal data to a cyber crook.

Try to avoid visiting sites from dubious corners of the Internet; containing file-sharing, freeware, shareware, warez, and the like. These sites are absolutely notorious for containing malicious software, such as a Remote Access Trojan.

It really is not a good idea to open email attachments from someone you don't know. Even if you know the sender, think twice before opening attachments that you are not expecting or do not recognize. Sadly, these attachments may very well be infected with malware, including a Remote Access Trojan.

As you can see, there are steps that you can take to prevent and detect Remote Access Trojans, also known as RATs and Backdoor Trojans. Remember, when it comes to Internet security, an ounce of prevention is worth a pound of cure.

Christopher is passionate about sharing his knowledge and expertise on online security and privacy. Visit Internet Security 101 for the tools and resources to protect your Internet security and privacy, including free Internet security software.

View the original article here


  1. This comment has been removed by the author.

  2. If a portion of the applications are distinguished as spyware or adware and have completely working uninstallers, then it is anything but difficult to evacuate them. With the assistance of the evacuation programming in your control board, you can undoubtedly expel the suspected malware.