Trojan Removal - Five Easy
How to remove a Trojan - including a free
Trojans can be quite a nuisance when it comes to detecting and removing them
from your computer. Trojans are not as obvious as viruses. In fact they are programmed to keep
out of sight and away from detection. They do not cause the corruption of files or the deletion
of the more noticeable applications and documents in your computer.
Their very nature of making them difficult to detect
can make trojan removal a trying task. The process of trojan
removal begins with the detection of trojans within the computer system. This part of the trojan
removal process will not cost you a cent and is very simple.
There are three tools that you can use for the
detection of trojans, two of which can be found in every computer that is installed with a
Windows operating system. The first method of detection is to go to the C:\program
files\common\microsoft\msinfo folder to view the system information utitlity (msinfo32.exe). This tool will show
you all the programs that are running at that very moment. Search through the list of running programs to find
any programs that are suspect or you do not recognize. To be sure that these are trojans, check the file paths,
names and properties.
Use your virus scanner to scan the file executable
or .dll. If you are still not sure about the file then disable it using the Startup Programs editor which can be
found in the tools menu. Restart your computer leaving these applications disabled. This process not only allows
you to detect the trojans but is also a trojan removal tool.
Although trojans are difficult to detect, they do have one weakness
that makes them vulnerable. Trojans need to communicate with each other. The trail left by their communication can
be easily traced and is an easy method of trojan removal.
In all windows operating systems, the Netstat
command shows a list of all the connection to and from your computer that are open. Typing ‘netsta-an’ in a
DOS box will allow you to view this list. Any unfamiliar connections can be tracked down using the third tool
that is available for trojan detection i.e. TCPview.
Sysinternals free utility, TCP view will tell you exactly what program
is using the suspect connection to your computer. With this information you can locate the program that is
accessing and disseminating data from your computer. The best method of trojan removal is by renaming the suspect
file then restarting your computer. This will allow you to correct your mistake if the file you suspected was
In summary, different trojans will require their own method of removal.
However, there are general steps that you can follow in every trojan removal process.
Identification of the trojan in your system
Discover its starting point and take steps to prevent its restarting when you
reboot your computer
Delete the trojan and reboot your computer