Hot Off the Press
Check back regularly for the latest news and tips from the world of IT.
New Site Goes Online
C&M Consulting Group goes online with a brand-new website! The site provides information all about us, our services and IT strategies. Find out how C&M Consulting Group can make technology work for you.
Trojan Horse Attacks
Trojan horse attacks pose one of the most serious threats to computer security. If you were referred here, you may have not only been attacked but may also be attacking others unknowingly. This page will teach you how to avoid falling prey to them, and how to repair the damage if you already did. According to legend, the Greeks won the Trojan war by hiding in a huge, hollow wooden horse to sneak into the fortified city of Troy. In today's computer world, a Trojan horse is defined as a "malicious, security-breaking program that is disguised as something benign". For example, you download what appears to be a movie or music file, but when you click on it, you unleash a dangerous program that erases your disk, sends your credit card numbers and passwords to a stranger, or lets that stranger hijack your computer to commit illegal denial of service attacks like those that have virtually crippled the DALnet IRC network for months on end.
Please click here to to find out more about Trojan Horse attacks.