Avoiding trojans

Discussion started on Tech Problems and Solutions

Avoiding trojans
Beyond the issues mentioned above, you should maintain a healthy skepticism to protect yourself against more mundane trojans. In particular, don’t open any application from an unknown source. Okay, I hear you, you’re not sure what the difference is between a known and unknown source. The following are examples of an unknown, and possibly untrustworthy, source:
Anything from a web site claiming you have viruses (a web site cannot scan your machine for malware!)
E-mail attachments from someone you don’t know
E-mail attachments from someone you know, but who you also know has absolutely no judgement about what they would open
E-mail attachments from someone you know that you were not expecting
Anything sent to you via online means other than e-mail (messaging software, web forums, etc) from someone you don’t know
Web sites visited by clicking a link in an e-mail from someone you don’t know
Anything on most peer-to-peer file sharing networks (eg, torrents)
Anything from a web site with no name (ie, something like http://123.456.78.90)
Anything on a centralized download site, such as Softonic or
Anything on a site promising an Adobe Flash Player update, video plug-in for viewing the site’s content, video streaming apps, useless utility apps (such as “cleaning” apps) and other such junkware.

So, how does this compare to things that you can trust? Here are a few examples of trustworthy sources:
E-mail (or other online messaging) attachments you were expecting or from someone whose judgement you trust.
Downloads from a reputable web site
A few peer-to-peer sharing apps that have protection in place to ensure the file you are downloading is the same as a master file from a trusted source.

See next post for part 5
#2 - May 26, 2015, 08:09:36 PM


0 Members and 1 Guest are viewing this topic.