HeyChris Trojan

Posted: March 28, 2006 | Category: Trojans
This trojan usually tries to sneak into a target computer through many suspicious Internet resources. Although it's quite old, our of circulation and the majority of modern antiviral computers may easily detect and remove it, Hey Chris Trojan is still able to make several problems to older PCs with no proper defence installed on them. The following files were created in the system:

HideMBR Trojan

Posted: March 28, 2006 | Category: Trojans
This combination of nuke and trojan is really dangerous for those users, who have no good security on their PCs. There's a really big chance of having an infected computer disabled or damaged if there's HideMBR Trojan on it. It is usually the best choice to remove this spyware from the machine as soon as possible. The following files were created in the system:

HidePE Trojan

Posted: March 28, 2006 | Category: Trojans
Although this trojan doesn't usually carry any brutal damage, it is still able to annoy inexperienced users. The main aim of HidePE Trojan is changing many computer settings . It is strongly recommended to remove this pest from the infected machine as soon as possible. The following files were created in the system:

Hirurg Trojan

Posted: March 28, 2006 | Category: Trojans
Hirurg Trojan has a lot of variation; several variations may be quite new and hard to detect with modern antiviral computers, that's why it's always a good technique to treat unknown files carefully. This spyware usually makes annoying actions, but sometimes its activities may bring quite serious problems . The following files were created in the system:

HLL.6112 Trojan

Posted: March 28, 2006 | Category: Trojans
Although this trojan is quite old and easy to detect by many modern antiviral computers, it's still dangerous for those, who have no proper security computers installed on their PCs. After sneaking into a target computer via many suspicious Internet resources , this spyware starts its destructive activities, which may lead to several serious consequences, such as computer instability or loss of performance. It's always recommended to remove HLL.6112 from the infected machine as soon as...

HLLC.4194

Posted: March 28, 2006 | Category: Trojans
This trojan, which was written in high level language, usually sneaks into a target computer through many Internet resources and starts its destructive actions. Although HLLC.4194 is quite old and easy to recognize for the majority of modern antiviral applications, it's still a threat because of its brutal actions, which may seriously damage the infected computer . The following files were created in the system:

WebDir

Posted: March 28, 2006 | Category: Adware
WebDir is an adware program that tends to embed into Internet Explorer program implementing to be a browser helper object (BHO).Once installed, WebDir will secretly launch on every Windows startup and resolves non-existent domain names to point to sponsored content. WebDir is designed to redirect your mistyped searches to its predefined websites set by the affiliates of WebDir. Note that WebDir adware program is affiliated with New.Net application.

Popper

Posted: March 28, 2006 | Category: Trojans
Popper is a trojan designed to show unsolicited pop-up advertisements. It also contacts a predetermined remote host to receive specific instructions. Some of these instructions allow the threat to silently download from the Internet and install additional malicious spywares. Popper automatically runs as a service on every Windows startup.

ZangoSearch

Posted: March 28, 2006 | Category: Adware
ZangoSearch is an advertising-supported application that installs free games and softwares. However, it also monitors user Internet activity and opens partner web sites when it detects specific keywords that the user enters into the web browser's search field or shopping sites. ZangoSearch is able to restore silently restore itself if some of its components were removed. The application automatically runs on every Windows startup.

HLLO.4734

Posted: March 28, 2006 | Category: Trojans
Although this trojan, which belongs to the family of spywares, written in high-level languages, is quite old and easy to detect for almost all of modern security computers, it is still quite a big threat for those, who have no defence computers installed on their PCs. HLLO.4734 usually performs a set of destructive actions, which usually cause many unwanted effects . The following files were created in the system:

HLLO.Knight.8252

Posted: March 28, 2006 | Category: Trojans
Although this spyware is quite old and unable to damage most of modern computers, there may be several modifications of HLLO.Knight.8252, which can bring more damage ever for newest PCs. This trojan usually acts in a simple, but very effective way - it searches for many files and overwrites them with a copy of itself. As a result of these actions, original content of the infected file is lost and can't be restored. It's strongly recommended to remove HLLO.Knight.8252 as soon as possible....

Fire Trojan

Posted: March 28, 2006 | Category: Trojans
This trojan includes many features, which are typical for other types of spywares , that's why Fire Trojan is really dangerous. One of the main ways of getting infected with this spyware is using IRC and accepting many suspicious file transfer proposals. Fire Trojan is able to make a lot of problems to the user of the infected computer, that's why it's always a wise choice to detect and remove this pest from the infected computer as soon as possible. The following files were...

Homicide Trojan

Posted: March 28, 2006 | Category: Trojans
This trojan is actually a flooder, which usually uses an infected PC as an attack tool. Homicide may easily send its copies to every address, found in the address book of the infected machine. All in all, this spyware is quite harmful and should be removed from the PC as soon as possible. The following files were created in the system:

Horns Trojan

Posted: March 28, 2006 | Category: Trojans
After sneaking into a target machine via many ways of transferring data , this spyware starts its destructive actions, which may lead to some really serious consequences, such as the loss of data or computer instability. Although Horns Trojan, which was created in 1997, is easy to detect and remove by the majority of modern antiviral computers, it's still recommended to treat unknown files carefully in order to prevent your PC from getting infected. The following files were created...

Ilomo

Posted: March 28, 2006 | Category: Trojans
Ilomo is a trojan that injects a malicious code into Internet Explorer in order to silently download from the Internet and execute arbitrary files. Some of them appear to be harmful and dangerous. Ilomo can get into the computer while visiting some insecure web sites.

The Best Offers Network

Posted: March 28, 2006 | Category: Adware
The Best Offers Network is an advertising-supported application that installs free games and useful softwares. However, it also serves unsolicited advertisements and commercial pop-ups, monitors user Internet activity and transfers gathered data to predetermined remote servers. The Best Offers Network must be manually installed.

SillyFDC

Posted: March 28, 2006 | Category: Worms
SillyFDC is a relatively harmless worm, which is designed only to spread and therefore does not carry any destructive payload. The spyware propagates mostly through floppy disks.

VBSilly

Posted: March 28, 2006 | Category: Trojans
VBSilly is a worm that spreads through online chat and file sharing networks using popular instant messengers and peer-to-peer softwares including ICQ, MSN Messenger, eDonkey2000, Shareaza, Morpheus, BearShare, Kazaa and its derivatives.

Hotmail Hacker

Posted: March 28, 2006 | Category: Trojans
As follows from the name of this spyware, Hotmail Hacker was designed for stealing passwords. This malicious software is able to steal MSN messenger’s passwords in a short time, that's why it's a really dangerous tool in the hands of a hacker. Actions, which are usually easy to complete with this trojan, are a threat to user's privacy, that's why removing Hotmail Hacker as soon as possible would be the best decision available. The following files were created in the system:

Hound Trojan

Posted: March 28, 2006 | Category: Trojans
This trojan, which was created in 1996, sometimes was a powerful tool of hacking into many computers, but even nowadays it is still able to make some serious problems to users of old computers. With the help of Hound Trojan a hacker gets a partial access to the infected machine. There may occur several really negative effects on the infected computer, that's why protecting your computer by installing an up-to-date security computer would be the best decision. The following files...