DelFiles Trojan

Posted: March 28, 2006 | Category: Trojans
This destructive trojan is a trojan. It uses its simple but very effective algorithm for searching and deleting many types of files from the hard disk. The loss of different key files may strongly affect the computer, causing it work in unstable way. It is tremendously important to keep antiviral databases updated in order to prevent such trojans from infecting the computer. The following files were created in the system:

Eatonway Trojan

Posted: March 28, 2006 | Category: Trojans
This trojan usually tries to sneak silently into the target computer from many Internet resources, such as newsgroups or peer-to-peer networks. Once run on the victim PC, Eatonway Trojan gives a partial access to the infected machine to the hacker. That hacker is able to modify many computer settings, handle different files or steal private data. This is a real threat to the security of the infected machine, that's why detecting and removing Eatonway Trojan is strongly recommended....

Elfin Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious software is a trojan, which means that it doesn't strive to make as many copies of it as possible. Elfin Trojan usually makes its destructive actions, which always can seriously damage the infected machine, that's why it's always a wise choice to detect and remove this spyware from the PC as soon as possible. The following files were created in the system:

Elim Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous trojan is a constant threat for those, who have no reliable defence computer installed on their PCs. Elim Trojan usually acts in a destructive way by damaging many files . This simple but effective technique can make a lot of problems for the user of the infected machine. The following files were created in the system:

ElSpy Trojan

Posted: March 28, 2006 | Category: Trojans
This trojan has a lot of common features with many worms. ElSpy usually infects the computer via IRC channels and starts its destructive actions on the infected machine. This spyware may infect other IRC users, share the C: drive of the infected computer or simply damage several important files, which are necessary for the proper computer working. The following files were created in the system:

Raza FTP 1.0

Posted: March 28, 2006 | Category: Remote Administration Tools
This is a Remote Administration Tool that is used by hackers to control the victim's machine remotely. The possibilities of such application depend on the needs of the attacker. The attacker infects the PC via the e-mail or File and Print Sharing. A "server" allows him to connect via a "client" on his own machine. The functions of a RAT may vary, depending on the needs of the hacker. Some RATs can't really harm your PC and the only purpose they were made for is hooliganism. But some versions...

RDR

Posted: March 28, 2006 | Category: Remote Administration Tools
This is a Remote Administration Tool , used by hackers for gaining access to distant PCs. A RAT application works by a simple but effective principle: the hacker infects the machine with a "server" application via the e-mail or File and Print Sharing computer and can control it, using a "client" on his PC. The functions of a RAT can vary, depending on the needs of the attacker. This RAT creates a "backdoor" in the security computer of the infected PC. It allows the intrude to bypass the AV...

Real2000 Server

Posted: March 28, 2006 | Category: Remote Administration Tools
This is a Remote Administration Tool that is used by hackers to control the victim's machine remotely. The possibilities of such applications depend on the needs of the attacker. The attacker infects the PC via the e-mail or File and Print Sharing. A "server" allows him to connect via a "client" on his own machine. The functions of a RAT may vary, depending on the needs of the hacker. Some RATs can't really harm your PC and the only purpose they were made for is hooliganism. But some versions...

Recon

Posted: March 28, 2006 | Category: Remote Administration Tools
This is a Remote Administration Tool that is used by hackers to control the victim's machine remotely. The possibilities of such applications depend on the needs of the attacker. The attacker infects the PC via the e-mail or File and Print Sharing. A "server" allows him to connect via a "client" on his own machine. The functions of a RAT may vary, depending on the needs of the hacker. Some RATs can't really harm your PC and the only purpose they were made for is hooliganism. But some versions...

EndOfDay.566

Posted: March 28, 2006 | Category: Trojans
This malicious application is a trojan, which means that it doesn’t strive to make many copies of it and send them to different addresses. EndOfDay.566 specializes in harming one single machine by performing many destructive actions on it. These actions may usually damage the infected machine, causing such unwanted effects as computer instability. The following files were created in the system:

Enmasse.exe Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware usually tries to sneak silently into the target PC through many Internet resources, such as peer-to-peer networks. Once run on a specific PC, Enmasse.exe starts its destructive activities, which can often lead to serious consequences . The following files were created in the system:

Erase 2002 Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious application is often described as a nuker, which means it's really dangerous for those users, who have no good security computer installed on their PCs. Erase 2002 Trojan usually tries to damage many files, which are really critical; this usually leads to serious consequences, such as data loss, computer instability and loss of performance. It is usually the best choice to detect and remove Erase 2000 from the infected machine as soon as possible. The following files...

Erase 26 Trojan

Posted: March 28, 2006 | Category: Trojans
As many other trojans do, this spyware usually concentrates on damaging one particular PC. By damaging many key files of the computer, Erase 26 Trojan makes a lot of harm to the infected computer, which may start acting in unwanted way and become unstable. It's strongly recommended to keep virus definitions updates in order to prevent this pest from sneaking into the computer. The following files were created in the system:

Erase HD Trojan

Posted: March 28, 2006 | Category: Trojans
This brutal spyware may become a reason of many problems for those, who have no reliable defence on their PCs. The Erase HD Trojan uses its simple but very effective technique for erasing the hard disk of the infected machine. In case of success all data on the hard drive might be lost. It's always recommended to prevent this pest from damaging your computer by keeping your antiviral computers up-to-date. The following files were created in the system:

Red ZONE

Posted: March 28, 2006 | Category: Remote Administration Tools
This is a Remote Administration Tool that is used by hackers to control the victim's machine remotely. The possibilities of such applications depend on the needs of the attacker. The attacker infects the PC via the e-mail or File and Print Sharing. A "server" allows him to connect via a "client" on his own machine. The functions of a RAT may vary, depending on the needs of the hacker. Some RATs can't really harm your PC and the only purpose they were made for is hooliganism. But some versions...

Red-Spy

Posted: March 28, 2006 | Category: Remote Administration Tools
Foto Red Spy is a Remote Administration Tool (RAT) that contains a backdoor functionality. Foto Red Spy may be used by remote attackers to exploit security vulnerabilities and allow attackers to obtain full remote access and control of the affected computer system. The remote cybercriminal may use Foto Red Spy to corrupt the victimized PC via the spam emails including malicious attachments or File and Print Sharing. Foto Red Spy may enable the remote cybercriminal to connect to the targeted...

Registry Loader 2.0

Posted: March 28, 2006 | Category: Remote Administration Tools
A Remote Administration Tool is a special kind of hacker malware, used for remote access and control of other people's PCs. The attacker infects the PC via the e-mail or File and Print Sharing. A "server" allows him to connect via a "client" on his own machine. The functions of a RAT may vary, depending on the needs of the hacker. Some RATs can't really harm your PC and the only purpose they were made for is hooliganism. But some versions can steal vital information, remove files and even...

RemCmd

Posted: March 28, 2006 | Category: Remote Administration Tools
RemCmd is a RAT tool designed to control remote PCs. RemCmd allows to manage the computer, change OS settings and perform similar tasks. Apparently it is not a spyware, but can be used for malicious actions. You should remove this tool from the computer.

Erase HDD Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous trojan usually carries a lot of destruction to the infected PC. As follows from its name, Erase HDD Trojan attempts to erase the hard disk of the infected machine. This procedure always leads to the loss of all data stored on the infected PC, that's why it's strongly recommended to remove this spyware from the computer as soon as possible. The following files were created in the system:

Erase System Trojan

Posted: March 28, 2006 | Category: Trojans
If no actions against this trojan are taken soon after infection, this spyware may cause several real problems, which can enormously harm the computer. The main aim of this pest is deleting many computer files, which are responsible for proper computer working. The loss of these files always leads to different negative effects, such as computer instability. The following files were created in the system: