You should identify Trojans in good time. They are not only annoying, but can also cause significant damage.
Detecting Trojans: This is how they define themselves
The Trojans derive their name from the Trojan horse: a malicious program disguised as a useful application sneaks onto your computer.
- Camouflage is usually achieved through inconspicuous file names, which are named after system files, for example.
- Many users are therefore not even aware that their computer is infected with a Trojan.
- Typically, Trojans aim to spy on passwords and similar data or to remotely control your computer for illegal purposes.
How to recognize a Trojan
To avoid falling victim to a Trojan, it is important to recognize it in time.
- First, check the running processes. Since the built-in Windows Task Manager may not display some processes, use a more comprehensive alternative such as the free “System Explorer”. You can also forward suspicious processes for inspection directly from the program. Processes that have a high CPU load are particularly suspicious.
- Then check your computer's Internet connections. Use the program “TCPView” to do this. It not only lists all connections, but also shows which process started them. If a connection seems suspicious, you can take a closer look at the respective process in the “System Explorer” and have it tested.