Talk:Trojan horse (computing)
This is the talk page for discussing improvements to the Trojan horse (computing) article. This is not a forum for general discussion of the article's subject. |
Article policies
|
Find sources: Google (books · news · scholar · free images · WP refs) · FENS · JSTOR · TWL |
Archives: Index, 1Auto-archiving period: 90 days |
This level-5 vital article is rated C-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | ||||||||||||||||||||||||||||||||
|
Tech Support Scams claiming trojans are on your machine
[edit]Tech support scams are an industry-wide issue where scammers use scare tactics to trick you into unnecessary technical support services that supposedly fix contrived device, platform, or software problems.
At best the scammers are trying to get you to pay them to "fix" a nonexistent problem with your device or software. At worst they're trying to steal your personal or financial information; and if you allow them to remote into your computer to perform this "fix" they will often install malware, ransomware, or other unwanted programs that can steal your information or damage your data or device.
Scammers may claim they are an affiliate of Microsoft and lead you to this Wikipedia page to pretend to teach you about Trojans.
Computer
[edit]Trojan horse is called is called to a computer program 39.44.163.77 (talk) 20:37, 28 August 2022 (UTC)
Computer
[edit]Histroy of Trojan Horse Virus? 111.119.49.123 (talk) 14:22, 14 September 2022 (UTC)
Wiki Education assignment: The Phoenicians - Cunning Seafarers
[edit]This article was the subject of a Wiki Education Foundation-supported course assignment, between 24 January 2024 and 15 May 2024. Further details are available on the course page. Peer reviewers: SusJawn35, Cabbagepatch12345.
— Assignment last updated by MotoMoto1952 (talk) 13:08, 15 April 2024 (UTC)
- C-Class level-5 vital articles
- Wikipedia level-5 vital articles in Technology
- C-Class vital articles in Technology
- C-Class Computer Security articles
- High-importance Computer Security articles
- C-Class Computer Security articles of High-importance
- C-Class Computing articles
- High-importance Computing articles
- All Computing articles
- All Computer Security articles
- C-Class software articles
- Mid-importance software articles
- C-Class software articles of Mid-importance
- Unknown-importance Computing articles
- All Software articles