Crackers can send Trojan horses that turn computers into zombie computers without the user's knowledge. A Trojan horse is disguised software that appears useful but has destructive effects like accessing files and sending personal information to other locations. To protect against Trojans, users should be wary of emails and attachments, install antivirus software and firewalls, and scan all downloaded files. If infected, users should disconnect from the internet and remove suspicious files or reinstall their operating system.