Information Technology Support
Page tree

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Updated section on trojans

...

Trojans pretend to be legitimate software, but run malicious code not immediately visible to the user. To avoid trojans, only download applications from verified vendors and trusted websites.

Depending on the type of operating system you have, you should have some default antivirus protection but may need to supplement with additional malware protection. 

...