2014年6月21日星期六

How does Trojan JS/Kryptik.I get on your computer?

How does Trojan JS/Kryptik.I get on your computer?
Though you have your computer protected by your powerful antivirus program and update the firewall on time, Trojan JS/Kryptik.I still can invade into your computer without any of your permission. Typically, it gets on your computer via your downloading and installing. It disguises itself as video codecs that you need to install in order to view some videos, typically porno ones related. Also, Trojan JS/Kryptik.I can get on your compute via games downloading and installing. Apart from that, Trojan JS/Kryptik.I also can penetrate your compute via:
1. your clicking on the malicious links.
2. your browsing the hacked websites planted with exploit code that tries to install Trojan JS/Kryptik.I on your computer without your permission.
3. your opening the infected email attachment.

Roles that Trojan JS/Kryptik.I can play on your computer
1. A foxy sneaker: it gets on your computer without any warning or any of your permission.
2. An immortal trojan: your antivirus program can’t remove Trojan JS/Kryptik.I completely.
3. A retarder: it drags down your computer speed by running its amounts of programs in the background, which eats up the system resource. Your computer will become slower and slower day by day. It can even become unresponsive.
4. A key logger: Trojan JS/Kryptik.I may carry a key logger that can log your every keystroke.
5. A stealer: it gathers your browsing history for the marketer and uses the information to pop up more and more advertisements. It may also expose your sensitive information like credit card details and some account log in details.
6. A trouble maker: it compromises your computer and creates loopholes for the additional malware like trojan, spyware and ransomware.
7. A malicious deleter: it can corrupt, destroy and delete your precious files.
8. It gives remote access for the hacker. Your computer may be out of your control.


没有评论:

发表评论