SpyOutside

Posted: March 28, 2006 | Category: Keyloggers
SpyOutside is a commercial keylogger that records all user keystrokes and captures screenshots. Gathered data can be sent to a configurable e-mail address, uploaded to a predefined FTP server or transferred to a remote host. SpyOutside must be manually installed. SpyOutside runs on every Windows startup.

Gh0std Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous spyware is a combination of trojan and worm. This means Gh0std Trojan is especially dangerous because of its technique of deleting many computer files, some of which are really important for the proper computer working. The following files were created in the system:

Ghost Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware usually tries to sneak silently into the computer from many Internet resources and start making its destructive actions. If no actions against Ghost Trojan are taken immediately after getting infected, a lot of problems may occur. The following files were created in the system:

Gina Trojan

Posted: March 28, 2006 | Category: Trojans
This trojan is really dangerous for those, who have no good security computers installed on their PCs. After sneaking into the target machine, Gina Trojan starts performing a set of destructive actions, which usually carry a lot of harm for the infected computer, which may start working in unstable way. The following files were created in the system:

GoHotList Trojan

Posted: March 28, 2006 | Category: Trojans
This trojan was created with one specific purpose - it usually sneaks into the target PC and tries to change its Internet Explorer's default page to a porno site. Although this action isn't dangerous for the stability of the infected computer, it's really annoying and should always be removed as soon as possible. The following files were created in the system:

Gouraud Trojan

Posted: March 28, 2006 | Category: Trojans
Although this spyware is quite old and rarely used by hackers, it's still a potent threat for those, who have no modern antiviruses installed on their machines. Gouraus Trojan can provide the hacker with a partial control over the infected computer; this may cause a loss of private data , that's why removing this pest as soon as possible would be the best decision available. The following files were created in the system:

Grinder Trojan

Posted: March 28, 2006 | Category: Trojans
This trojan is always a threat for those, who have no defence installed on their PCs. Grinder Trojan usually damages files of many types; some of these files are critical for the proper computer working, that's why having good updated antiviral computer is recommended for preventing your computer from getting infected with this spyware. The following files were created in the system:

Spytector

Posted: March 28, 2006 | Category: Keyloggers
Spytector Spytector is a spyware keylogger program designed to record all your keystrokes that you type. Usually Spytector hides deeply in the system so that it would be difficult to remove it. In addition, Spytector may take screenshots regularly and log every web page that the user visits, all IM and email conversations. Then Spytector may send all the collected information to the remote attacker. Spytector is a serious risk to your personal and financial information.

Quick Keylogger

Posted: March 28, 2006 | Category: Keyloggers
QuickKeylogger is a keylogger application that can record activity and keystrokes on your computer. QuickKeylogger is know to run undetected so you do not know when your personal information and activity is getting monitored. QuickKeylogger has the ability to send the recorded logs to remote users where hackers can use this to steal your personal information which may lead to identity theft. QuickKeylogger may be hard to remove from your computer manually. You must take action to remove...

Personal Inspector

Posted: March 28, 2006 | Category: Keyloggers
Personal Inspector is a commercial keylogger that tracks user activity in the Internet, records all keystrokes and captures screenshots. Collected data is saved to a hard disk. Personal Inspector must be manually installed. The application runs on every Windows startup.

Soldier Trojan

Posted: March 28, 2006 | Category: Trojans
This multipurpose spyware is able to harm the infected computer in many ways. The main way of getting infected with Soldier Trojan is using IRC and accepting many suspicious file transfer proposals. This spyware can always use the infected machine as an attack tool for breaking many Internet resources. The infected computer is always in danger of losing different key files, that's why it's always the best choice to detect and remove Soldier Trojan as soon as possible. The following...

GT-VirtualSlut

Posted: March 28, 2006 | Category: Trojans
This trojan horse usually sneaks into the computer via IRC after a user accepts suspicious file transfer proposal or follows web links. GT-VirtualSlut allows the hacker to control the infected machine through IRC, that's why careful attitude towards it is always a good technique of working. Many problems can be cause with the help of this spyware, that's why having your PC protected with a reliable antiviral computer is a good decision too. The following files were created in the...

Guess Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware is a trojan, which concentrates on damaging one particular PC, instead of striving to send its copies to many addresses. Guess Trojan performs a set of destructive actions on the infected computer; some of these actions are a potent threat for the stability and security, that's why detecting and removing this pest from the infected machine would be the best choice. The following files were created in the system:

GWars Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous spyware is always a potential threat for those users, who haven't got their PCs equipped with reliable antiviral computers. GWars Trojan usually performs many destructive actions on the infected machine; some of these actions are only annoying, others damage different key files . The following files were created in the system:

SearchNugget

Posted: March 28, 2006 | Category: Adware
SearchNugget installs additional Internet Explorer toolbar that provides a web search service. The spyware also changes web browser's default start page to a site on the searchnugget.com domain. SearchNugget can get into the computer along with some ad-supported software or can be manually installed. It runs every time the user launches Internet Explorer.

Ztoolbar

Posted: March 28, 2006 | Category: Browser Helper Object
Ztoolbar, aka Aze Search Toolbar, is an Internet Explorer toolbar that provides a web search service and shows undesirable commercial advertisements. Ztoolbar adds a toolbar to your Internet Explorer, and will redirect all the google's domain to ip addresses of its server. This program modifies the Windows registry in order to register itself as a web browser add-on. Ztoolbar is also known as Zango Search Assistant.

DailyToolbar

Posted: March 28, 2006 | Category: Bad Toolbars
DailyToolbar is a malicious Internet Explorer toolbar that creates links to pornographic web sites, shows undesirable pop-up advertisements and changes web browser's default home page. DailyToolbar also provides a web search service. DailyToolbar can secretly get into the computer while visiting some insecure web sites. DailyToolbar spyware runs every time a user opens Internet Explorer.

ZQuest

Posted: March 28, 2006 | Category: Adware
ZQuest is a harmful adware spyware that shows undesirable commercial advertisements. It also contacts remote web server, secretly downloads multiple adware threats such as Aurora or BargainBuddy, silently installs them and infects already compromised PC with even more dangerous spywares. ZQuest must be manually installed. It automatically runs on every Windows startup.

DashBar

Posted: March 28, 2006 | Category: Bad Toolbars
DashBar is an Internet Explorer toolbar that extends web browser functionality and can download and install main components of certain adware spywares such as GAIN threat without explicit user consent. DashBar must be manually installed. It runs every time the user opens Internet Explorer.