A Trojan horse is a malicious application that is designed to enable remote access to the target computer system. Trojan horses cannot automatically replicate themselves. After installing a Trojan horse, it is possible for hackers to access the computer remotely and perform various operations. The operations that can be performed are limited by the design of Trojan horse and by user privileges on the attacked operating system. Common operations include:
Generally, most Trojan horses can be detected and removed by AVG. The Identity Protection component (available in some AVG editions) can also protect the computer against various types of malware, including Trojan horses, based on behavioral monitoring of running processes.
Trojan horses can be also removed manually, but this requires complete information on how the particular Trojan horse operates.