A Trojan infection can be avoided by the following measures:
Do◘ not download any file from
unknown people or site without making sure that the file is genuine.
While◘ opening file make sure what the file is, even if the file comes from a friend.
Do◘ not make use of attributes in
programs that automatically get or
The◘ user should not be lulled into a
false sense of security just because an
anti-virus program is running on the
Ensure◘ that the corporate perimeter
defenses are kept continuously up-to-
Filter◘ and scan all content at the
perimeter defense line that could
contain malicious content.
Run◘ local versions of anti-virus,
firewalls, and intrusion detection
software at the desktop.
Rigorously◘ control user’s permission
within the desktop environment to
prevent the installation of malicious
Manage◘ local workstation file integrity through check-sums, practice auditing, and port scanning.
Monitor◘ internal network traffic for
odd ports or encrypted traffic.
Use◘ multiple virus scanners
Install◘ software for identifying and