The Christian Trojan Horse

Who hasn’t encountered the Trojan Horse, unless you have a Mac of course! Trojan Horse  is malware that appears to perform a desirable function for the user prior to run or install but instead facilitates unauthorized access of the user’s computer system. Malware is a harmful piece of software that looks legitimate. Users are typically tricked into loading and executing it on their systems.

The Trojan Horse is a tale from the Trojan War, as told in Virgil’s Latin epic poem The Aeneid and by Quintus of Smyrna.

Briefly, Greeks constructed a huge wooden horse, and hid a select force of 30 men inside. The Greeks pretended to sail away, and the Trojans pulled the Horse into their city as a victory trophy. That night the Greek force crept out of the Horse and opened the gates for the rest of the Greek army, which had sailed back under cover of night. The Greek army entered and destroyed the city of Troy, decisively ending the war.

Christianity created its own Trojan Horse known as……an eternal HELL!

The idea of an eternal hell where you are tormented by FIRE (without being destroyed of course) incessantly, while loved ones in heaven watch and rejoice from above, is implanted in the MINDS of church-goers. Once this FEAR firmly takes root, the church can then attack from WITHIN the gates of the human psychic with all manner of guilt trips, condemnations, and threats.

Kids early on in Sunday school are exposed to this Trojan Horse of Hell and grow up in fear of God or at minimum wondering if they will ever measure up.

How easy it is after a decade of hell fire and brimstone indoctrination to forget that we were: 1) created in the image of God, 2) made the apple of God’s eye, 3) God is unconditional love, and 4) We are one with the Father-Spirit-Consciousness-Vibration-Light-each other!

Don’t invite that Trojan Horse into your life and surely don’t get you kids addicted to such a scheme!. Life and God are too good to embrace such a concept.

As a spiritual-futurist, I have a BA degree majoring in history. One cannot know the future without knowing the past which holds clues to what is on the horizon. The world is in such a rapid expansion of knowledge that we are close to entering a tipping point that will forever change earth as we know it.

San Antonio IT Consulting ? Trojan Horse Virus

A Trojan or Trojan Horse Virus is a program that usually gets downloaded installed and executed on a computer system which then appears to be performing some useful function but is unknowingly allowing unauthorized access to the user’s computer system at the same time.
Hackers use Trojans to gain access to a user’s computer remotely and then perform any number of malicious activities. These nefarious activities can include but certainly are not limited to:
Data Theft.
Keystroke Logging.
Downloading or Uploading Files.
Viewing the Victims Screen.
Crashing the Users System.
Symptoms of Infection:
Very sluggish computer performance.
Random system lockups or crashes.
Browser redirection – you are taken to websites you were not searching for while browsing the Internet.
Excessive number of popup windows appearing at random while surfing the Internet.
You are informed that your system has ‘hundreds’ of active infections and you are redirected to a website that insists you pay for and download their specific software package to remove the infections.
There are many good anti-virus / anti-spyware products on the market designed to detect and remove these types of infections. McAfee and Kapersky are good but AVG and Avast! have similar products and offer a free downloadable version. Be sure to complete a ‘Full’ system scan and quarantine and remove all active infections. Configure your anti-virus software to perform ‘active’ scanning or real-time system monitoring.
Do not install software you have downloaded from the Internet unless it has come from a known, reliable source.
Use caution if using file sharing platforms such as LimeWire or torrent sites to download files.
Do not open any email attachments from unknown sources.
Use a good anti-virus/anti-spyware application and scan your system at least weekly. Be sure your anti-virus software is totally up to date with the latest virus definitions.
For Windows users: Be sure to visit the Microsoft upate site and download all the latest Microsoft security patches.
In some cases your system may have become unable to install anti-virus software or has become completely unusable. If your computer system has unwanted Viruses, Spyware, Trojan Horse, Malware, Worm, Rootkit, Keylogging, or Adware installed on or infecting it and you would like to have one of our San Antonio IT Consulting specialists clean and optimize your system please click the button below.

San Antonio IT Consulting
IT Consulting San Antonio