Copy the code below and paste it in place of the code in the stylesheet in order to make these changes affect all your pages.

{% color "melody" color="#5191CC", export_to_template_context=True %} /* change your site's color here */

{% color "harmony" color="#5191CC", export_to_template_context=True %} /* change your site's secondary color here */

{% set topHeaderColor = "#1F3F6C" %} /* This color is solely used on the top bar of the website. */

Trojan.exe ❲LEGIT ◆❳

: Your antivirus or firewall may be turned off without your permission. What Is a Trojan Horse? Trojan Virus and Malware Explained

: High CPU or disk usage that makes your computer lag or crash.

: Once run, it may hide in your system folders (like C:\Windows\System32 ) and set itself to launch automatically every time you start your PC. Signs of Infection

: Unlike a "virus" that spreads by itself, a Trojan must be manually downloaded or run by a user—often disguised as a helpful tool, game, or document.

: Pop-ups, new icons you didn't install, or browser redirects to strange websites.

: It is often a program designed to spy on you, steal data (passwords, banking info), or give a hacker remote control over your computer.

: Your antivirus or firewall may be turned off without your permission. What Is a Trojan Horse? Trojan Virus and Malware Explained

: High CPU or disk usage that makes your computer lag or crash.

: Once run, it may hide in your system folders (like C:\Windows\System32 ) and set itself to launch automatically every time you start your PC. Signs of Infection

: Unlike a "virus" that spreads by itself, a Trojan must be manually downloaded or run by a user—often disguised as a helpful tool, game, or document.

: Pop-ups, new icons you didn't install, or browser redirects to strange websites.

: It is often a program designed to spy on you, steal data (passwords, banking info), or give a hacker remote control over your computer.