Nobof Trojan

Posted: March 28, 2006 | Category: Trojans
This is a dangerous trojan, which usually infects the computer via many Internet resources and performs a set of destructive actions. These actions may lead to different consequences: most of them only annoy users, but other actions may become a reason of many troubles, such as computer instability or loss of performance. The following files were created in the system:

NoFrills.840

Posted: March 28, 2006 | Category: Trojans
This memory resident parasitic trojan usually sneaks silently into a target computer and starts performing its destructive activities. These are usually quite harmless, but sometimes may result in many negative consequences, such as halting the computer. It is always recommended to remove NoFrills.840 from the infected computer as soon as possible. The following files were created in the system:

NoFrills.Dudley

Posted: March 28, 2006 | Category: Trojans
This trojan is absolutely harmless for the infected computer's stability or performance, but its activities often may annoy the user of the infected machine. NoFrills.Dudley Trojan usually deals with *.COM files by writing its own code into these files. This spyware also contains the following text: '[Oi Dudley!][PuKE]'. The following files were created in the system:

Nogzoeen Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious application usually sneaks into the target PC and tries to perform a set of destructive actions there. In case of success, some very important computer components might be damaged. This usually results in the loss of performance and stability of the infected computer, that's why removing Nogzoeen Trojan from the machine would be the best choice possible. The following files were created in the system:

NT Killer Trojan

Posted: March 28, 2006 | Category: Trojans
If no actions against this spyware are taken soon after getting infected, it may become a real threat for your computer's stability and security. NT Killer usually acts by corrupting many key files, which are responsible for the proper computer working. The following files were created in the system:

AngryPing

Posted: March 28, 2006 | Category: Flooders
This application is designed as a trojan which sends a big amount of useless data to a specified PC. Such applications are often used on IRC channels to disturb communications. However, almost every self-respecting IRC channel is protected by special Flood detection algorithms. The primary function of flooders is DoS attack. This ICMP flooder was created in October, 2002. The following files were created in the system:

AnOrkyS MSN TOOLZ

Posted: March 28, 2006 | Category: Flooders
This 'small' MSN flooder is designed for disturbing your MSN Messenger work. It sends a massive load of useless data and jams the MSN channel. Your connection speed falls down critically, and you will not be able to use the Messenger. The date of origination is December, 200 The following files were created in the system:

Flooder.AOL.Ikobur

Posted: March 28, 2006 | Category: Flooders
This application overloads the connection by pinging. That causes a DoS attack. 'DoS' attack means 'Denial of Service'. It is a way to prevent users of using some kind of service. Hackers usually try to corrupt the work of server, or 'flood' your messenger But flooders can also be used for e-mail flooding. The following files were created in the system:

Ashaden Pinger

Posted: March 28, 2006 | Category: Flooders
This flooder keeps sending packets to the IP or URL over and over again. This will cause a DoS attack, which can crash the server or affect connection speed of your Messenger. There is a simple way to stop this flooder: just press Ctrl+C and then remove it correctly. The following files were created in the system:

Beer

Posted: March 28, 2006 | Category: Flooders
This flooder is a type of TCP bomber. It can damage your computer by corrupting vital files, such as key files, registry and computer files. The DoS attacks of this application can also crash your server or affect IRC connection speed. Some flooders may include the ability to install a 'backdoor' allowing the hacker to gain full remote control over your PC, or have a very nasty 'nuker' ability, that can seriously damage your PC. The following files were created in the system:

Bomb 2

Posted: March 28, 2006 | Category: Flooders
This application overloads the connection by pinging. That causes a DoS attack. DoS attacks may affect the work of your server or jam IRC channels. However, almost every self-respecting IRC channel is protected by special Flood detection algorithms. Flooders also may contain some pesky 'backdoor' or 'nuker' applications. It was created in April, 1997, and needs at least 5 Kb for storage. The following files were created in the system:

Boo Bomber 2

Posted: March 28, 2006 | Category: Flooders
This application overloads the connection by pinging. That causes a DoS attack. It sends a large amount of worthless data and jams yours IRC and MSN messenger. Most IRC channels have special flood-tracking algorithms, but flooders still remain a problem. The origination date is March, 2002, it needs 433 Kb for storage. The following files were created in the system:

Boom

Posted: March 28, 2006 | Category: Flooders
This application jams the connection with a DoS attack. It means that the connection is being constantly pinged or overloaded with a big load of useless data. But such applications can also contain some dangerous trojans or have the 'backdoor' or 'nuker' ability. The following files were created in the system:

CellHellVer

Posted: March 28, 2006 | Category: Flooders
The term 'flood' means overloading some application with a massive load of useless data, causing it to jam. This application is created to flood cell-phones by sending SMS messages continuously, so it is rather annoyng, than dangerous. It can also be used so send single a SMS. The following files were created in the system:

Flooder.Chat.Ghcif

Posted: March 28, 2006 | Category: Flooders
Such flooders are often used to disturb communications. This application overloads the IRC connection by continuously sending a large amount of data. That way it jams the channel or reduces the connection speed critically. However, almost every self-respecting IRC channel is protected by special Flood detection algorithms. The following files were created in the system:

Crip Flooder

Posted: March 28, 2006 | Category: Flooders
This application overloads the connection by pinging. That causes a DoS attack. Some versions also include the 'backdoor' function. It means that the intruder can get a full access to your PC. The application was created in March, 2002. The following files were created in the system:

Dark Hate 3.6

Posted: March 28, 2006 | Category: Flooders
Such a flooder can completely freeze your server with a DoS attack. It pings the server continuously until it crashes. A flooder can also contain other trojan functions or install a 'backdoor' that provides the hacker full access to your PC. This flooder was created in April 2003, it needs at least 405 Kb for storage. The following files were created in the system:

Databound 1.0

Posted: March 28, 2006 | Category: Flooders
This application lets you test your vulnerability to a UDP flood. It can also be used for DoS attacks, but crushing someone's server is not the primary function. A DoS attack means that the server is being continuously pinged, until it crashes. It was created in May, 1999. The following files were created in the system:

Divping

Posted: March 28, 2006 | Category: Flooders
This simple but effective application is DOS based, but still runs greatly under newer operation computers. It has no connecting script, because it is DOS based. It overloads the connection by fast pinging, causing the server to freeze. It can also disturb the work of some messengers, such as IRC or MSN. Sometimes this flooder is identified as Bionet. It was created in October 2003. The following files were created in the system:

DL Flooder

Posted: March 28, 2006 | Category: Flooders
This MSN Messenger flooder overloads the server by continuous pinging. That causes a DoS attack. Flooders can jam the IRC connection or even corrupt some vital files, such as registry, key files etc. Such applications are often used on IRC channels to disturb communications. However, almost every self-respecting IRC channel is protected by special Flood detection algorithms. It was created in April 2002. The following files were created in the system: