IWantNetSex Trojan

Posted: March 28, 2006 | Category: Trojans
Although this spyware is almost harmless, its actions still are quite annoying, that's why it's recommended to remove it from the infected machine as soon as possible. IWantNetSex Trojan usually changes IE default web page to http://www.iwantnetsex.com and creates a desktop shortcut to this address. The following files were created in the system:

Jackel Trojan

Posted: March 28, 2006 | Category: Trojans
Although this trojan was created in 1996 and many modern computers are immune to its destructive actions, it still may be a potent threat for those, who own old machines and no good security computers. After sneaking into a target PC, Jackel Trojan starts damaging many important computer components; this technique always lead to computer instability and other negative effects. The following files were created in the system:

Jiang Trojan

Posted: March 28, 2006 | Category: Trojans
There are no doubts, that this spyware is a real threat for everybody, who has no reliable defence on his or her PC. Jiang Trojan usually deals with many computer interrupts, making it possible to continue working with an infected PC only after restarting it. Although this method doesn't carry any special damage , it still is very annoying, that's why it's strongly recommended to detect and remove this spyware as soon as possible. The following files were created in the system:

Jidamod Trojan

Posted: March 28, 2006 | Category: Trojans
This old trojan, which was created early in 1997, still may become an annoying problem to many users. By using its special algorithm, this spyware increases the size of many files. These actions usually lead to decreasing of the free space on the hard drive and, as a result of this, a loss of performance. Removing this pest from the infected machine would be the best choice available. The following files were created in the system:

Jinmozhe Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware is a very dangerous trojan, which may infect any computer if there is no good and reliable defence installed on it. After sneaking into a target PC, Jinmozhe Trojan starts performing its destructive actions; some of these actions are annoying, others may seriously harm the stability and the security of the infected machine. The following files were created in the system:

Joker Trojan

Posted: March 28, 2006 | Category: Trojans
Although many users may mistakenly think that Joker Trojan is nothing more but a joke, the destructive power of this spyware is a real threat for every infected computer. This pest usually corrupts many computer files, which are responsible for the stability of a computer. The loss of these files may lead to many negative consequences, such as loss of important data and performance. The following files were created in the system:

Jonekey trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous spyware usually sneaks into any computer with no good and reliable defence installed through many Internet resources, such as peer-to-peer networks or newsgroups. Once run on a specific PC, Jonekey Trojan starts performing its destructive activities, which often may seriously damage the stability and the security of the infected machine. All in all, removing this pest as soon as possible would be the best decision available. The following files were created in the...

JS.Actpa

Posted: March 28, 2006 | Category: Trojans
This trojan is a member of a large family of JS viruses . JS.Actpa usually infects a computer via many suspicious Internet resources and starts performing destructive activities immediately. These actions may often lead to serious consequences, such as computer instability, that's why it's always recommended to detect and remove this pest from the infected machine as soon as possible. The following files were created in the system:

JS.E2H

Posted: March 28, 2006 | Category: Trojans
This trojan, which is written in Java Script, is usually a serious threat for the infected computer. By using its specific technique of damaging many files , JS.E2H can make a lot of problems. These may result in many negative effects, such as the loss of important data. The following files were created in the system:

JS.Trojan.Fav

Posted: March 28, 2006 | Category: Trojans
This dangerous trojan, which is a member of Java Script viruses, usually sneaks into a computer as a part of HTML code. After infecting the computer, JS.Trojan.Fav starts performing its destructive actions. In case of success, several key files may be corrupted and many problems with computer stability may occur. It is always recommended to remove this spyware from the infected machine as soon as possible. The following files were created in the system:

JS.Trojan.Freq

Posted: March 28, 2006 | Category: Trojans
This dangerous trojan, which was written in Java Script, usually sneaks into a tardet computer via many suspicious Internet resources. After infecting the computer, JS.Trojan.Freq starts performing its destructive actions, which usually lead to different negative effects . The following files were created in the system:

JS.Trojan.Noclose

Posted: March 28, 2006 | Category: Trojans
This malicious application usually sneaks into a computer with no proper defence installed on it from many Internet resources as a part of HTML code. Various negative effects may occur on the infected computer in the result of this infection. If no actions against JS.Trojan.NoClose are taken immediately, computer may start working in unstable way. The following files were created in the system:

JS.Trojan.Seeker

Posted: March 28, 2006 | Category: Trojans
This spyware usually infects a computer as a part of HTML code, which may be opened by a browser from many suspicious Internet resources. JS.Trojan.Seeker usually performs a wide variety of actions , such as changing start page of the IE or creating annoying shortcuts. Although this pest doesn't usually harm the computer seriously, it still would be the best choice to remove it as soon as possible. The following files were created in the system:

JS.VDrop

Posted: March 28, 2006 | Category: Trojans
This malicious application is another variation of JS-trojans, which are written in Java Script and infect the computer as a part of HTML code. JS.VDrop was designed for dropping many viruses onto an infected computer. This technique is always a great threat for every machine, that's why being protected from such spywares by having an up-to-date antiviral computer is always a good choice. The following files were created in the system:

Telefoon Trojan

Posted: March 28, 2006 | Category: Trojans
This trojan is a potent threat for any computer with no reliable security installed on it. After infecting the computer, Telefoon Trojan searches for files, which contain 'TELEFOON' string and, if such files are found, this spyware changes their content. After these actions are completed, the infected computer may start experiencing many problems and work in unstable way. The following files were created in the system:

Kasaki trojan

Posted: March 28, 2006 | Category: Trojans
Although this trojan is quite hard to find today, because its quite old and harmless for many modern computers, it is still quite a big threat for those users, who have old operating computers on their machines. Kasaki Trojan usually performs a set of actions and may cause some problems, such as computer instability. The following files were created in the system:

KeepSmiling Trojan

Posted: March 28, 2006 | Category: Trojans
Although this trojan doesn't usually carry any destructive actions, it is still advisable to remove it from the computer as soon as possible, because its actions are always quite annoying. KeepSmiling Trojan infects many files with its copy. Every time an infected file is run, a message with randomly selected text appears on the screen. The following files were created in the system:

Khiladi Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious software usually infects the target computer from many Internet resources, such as peer-to-peer networks or e-mail messages from unknown senders. After infecting the machine, Khiladi Trojan starts performing its destructive activities, which often may lead to serious consequences, such as computer crashes or loss of important data. The following files were created in the system:

Khurak 1.0

Posted: March 28, 2006 | Category: Trojans
This malicious application is a trojan, which usually performs many annoying actions on the infected PC. These actions usually are: opening the CD-ROM from time to time, showing many messages on the screen, etc. It is usually recommended to detect and remove this spyware from the infected machine as soon as possible. The following files were created in the system:

Killer AV

Posted: March 28, 2006 | Category: Trojans
This dangerous trojan usually sneaks into a computer from many Internet resources or e-mail messages from unknown senders. Killer AV tries to disable anti-virus, installed on the infected PC, in order to gain much more freedom and time for its destructive activities. These may often lead to several unwanted consequences, such as computer instability or crashes. The following files were created in the system: