Munga Trojan

Posted: March 28, 2006 | Category: Trojans
This trojan is a real threat for every computer because of its brutal actions. After infecting the PC, Munga Trojan tries to erase its hard disk. In case of success, all data on the PC will be lost and really hard to recover. It is always recommended to keep your antiviral databases updated in order to protect your PC from this spyware. The following files were created in the system:

Musdie 1.1

Posted: March 28, 2006 | Category: Trojans
This malicious application is a trojan, which usually gives the remote access to the infected PC to the hacker. He or she is able to modify many computer settings and files or steal private data . It is always recommended to remove Musdie The following files were created in the system:

Mystic Trojan

Posted: March 28, 2006 | Category: Trojans
Although this spyware is unable to harm many modern computers, because it's quite old, Mystic Trojan still is a real threat for those, who still use older versions of operating computers and have no reliable defence installed. This pest usually acts by modifying many critical computer components, which are responsible for the proper computer working. The following files were created in the system:

NBName Trojan

Posted: March 28, 2006 | Category: Trojans
Although this trojan usually acts like a sniffer on the infected computer and carry no real damage to its stability, it still would be a wise decision to remove this spyware from the machine as soon as possible. NBName Trojan searches for some specific information and sends it to the unanimous address. The following files were created in the system:

NCW Trojan

Posted: March 28, 2006 | Category: Trojans
This trojan is a very dangerous password capture. With the help of this tool, secretly installed on the victim's PC, the hacker gets the ability of stealing many passwords and login information. NCW Trojan simply acts by logging user's keystrokes and sending these logs to the specified address. It's recommended to remove this spyware from the infected machine as soon as possible, because it is a real threat for user's security and privacy. The following files were created in the...

Ndiff

Posted: March 28, 2006 | Category: Trojans
This application was originally designed as a network monitor tool, but nowadays hackers are also able to use for in their specific purposes. Ndiff makes it possible to scan for opened ports, visible hosts and other information, which is usually valuable for the hacker, who intends to break into a computer. The following files were created in the system:

Necro Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious software is always a potent threat for those users, who have no reliable security installed on their PC. Necro Trojan usually performs a set of destructive actions, which often become a reason of serious negative consequences, such as the loss of really important data or computer instability. The following files were created in the system:

NeoCity Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious software is a trojan, which allows the hacker to connect to the infected PC and perform many actions on it. These actions vary from annoying ones to really destructive . As it is clear from everything written above, this spyware should be removed from the infected machine as soon as possible. The following files were created in the system:

Nescan Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware is a trojan, which prefers infecting one specific PC instead of attempting to infect as many machines as possible. Nescan Trojan usually performs a set of destructive actions on the infected computer; these actions may often lead to many consequences and effects, such as losses of Internet connectivity and important data. The following files were created in the system:

Net-Acct

Posted: March 28, 2006 | Category: Trojans
This trojan was created with for specific purpose of logging the network traffic of the infected machine. Although this information is often useless, there still might be several cases in which the activity of Net-Acct can damage the security and the privacy strongly. The following files were created in the system:

NetBus Trojan

Posted: March 28, 2006 | Category: Trojans
NetBus Trojan is a dangerous trojan that is able to become a reason of many negative effects on the infected PC. NetBus Trojan can disable the Internet or other network connection by damaging critical computer components. NetBus Trojan is also able to make a lot of other damage to the infected computer, that's why removing NetBus Trojan as soon as possible would be a wise decision. The following files were created in the system:

NetCoach Trojan

Posted: March 28, 2006 | Category: Trojans
This backdoor may often become the reason of many serious problems for the user of the infected machine. NetCoach Trojan usually gives the hacker a remote control over the computer, enabling him or her to perform many destructive actions . It is strongly advisable to remove NetCoach from the infected PC as soon as possible. The following files were created in the system:

Netgrisch Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware usually sneaks into the victim PC via different Internet resources, such as peer-to-peer networks. Netgrisch Trojan is also able to infect the computer through suspicious e-mail messages from unknown senders. This pest is able to give an access to the infected machine to the anonymous hacker. The hacker then is able to produce a lot of troubles, such as losses of private information and performance. The following files were created in the system:

NeverEnd Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous trojan usually sneaks into a target computer via many suspicious Internet resources. Once run on a PC, NeverEnd Trojan starts performing its destructive activities, which usually result in a lot of unwanted consequences, such as instable computer working, many errors and the loss of performance. The following files were created in the system:

NexZus Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious application is a trojan, which is tremendously dangerous for the infected PC. The actions of NexZus Trojan usually result in the complete loss of all data, stored on the hard disk. This only happens after the user reboots the infected machine. It is strongly recommended to keep your antiviral application updated in order to protect your computer from getting infected with this pest. The following files were created in the system:

NGP Trojan

Posted: March 28, 2006 | Category: Trojans
NGP Trojan is a spyware, which is always able to harm the infected PC. This pest usually acts by sneaking silently into the target machine and trying to steal many private data. This data is usually confidential AOL information, such as passwords or logins. It is always a wise choice to keep your antiviral databases up-to-date in order to prevent your PC from getting infected. The following files were created in the system:

NiceDay Trojan

Posted: March 28, 2006 | Category: Trojans
NiceDay is a very old trojan, which is unable to spoil a nice day of the majority of users. Although almost all computers are immune to this pest's activities and it is really hard to find on the Web, it is still possible to get infected with NiceDay Trojan. In this case the best choice would be to remove this spyware as soon as possible. The following files were created in the system:

Niklaus Trojan

Posted: March 28, 2006 | Category: Trojans
Niklaus Trojan usually infects the computer as an attachment from many suspicious e-mail messages. This spyware infects the machine and gives the hacker a partial control over it. The hacker is able to produce a lot of damage to the infected PC's security and privacy by corrupting different key files or stealing confidential information. The following files were created in the system:

NMan4 Trojan

Posted: March 28, 2006 | Category: Trojans
Although this spyware, which was created in 1996, is quite obsolete and unable to damage modern computers, it is still able to infect several types of old operating computers. After infecting the machine, NMan4 Trojan starts infecting different files and may lead to serious troubles, such as the loss of data and performance. The following files were created in the system:

NoBock.440

Posted: March 28, 2006 | Category: Trojans
This trojan usually infects the computer via many Internet resources, such as suspicious web pages or peer-to-peer networks. NoBock.440 deals with *.COM files by writing several lines of its own code to the ends of these files. Each time when one of the infected files is run, this spyware wakes up and performs its actions again. In some cases NoBock.440 is able to halt the infected computer. The following files were created in the system: