As a computer science term, 'Trojan Horse' means software that contains malicious code.This term has derived from classic Trojan Horse myth. This kind of software looks like helpful for the users at first, but when it stars working once it damages your informations and other programs.
trojan Horse; makes hakers be able to reach your information without your permission.However, this is not done directly.You need to run the software in which the Trojan is hidden.For example; When you encounter a phrase such as "download free pdf file reader" software, a software other than known pdf readers can lure you into this trap.
What damage can Trojan horses do?
They can open your computer for remote access,
They can send e-mails,
They can damage your data,
They can hide in gateways,
They can infect the network file upload system,
They can disable your security software,
They can implement out-of-service attack,
They can harm your internet access.
How can we protect ourself?
Do not open e-mails that you do not trust,
Try to use antivirus software,
Keep your operating system up to date,
Do not use software such as Limeawire, Kazaa, Gnutella that share music and similar items on the Internet,
Do not enter websites that constantly change addresses at the first login,
Never manually update svchost32.exe, svhost.exe, back.exe, systems.exe, explorer.exe files. These files are the core files of the Windows operating system. The operating system updates itself.
And make sure to back up your data.
Wishing you virus free days.