Deadly Network Flood

Posted: March 28, 2006 | Category: Flooders
This application overloads the connection by pinging. That causes a DoS attack. This flooder is designed for network terrorism: jamming servers etc. It constantly pings the server, until it crashes from the large amount of information. Flooders often contain some other 'nice' surprises. They can install a 'backdoor' application for example. The following files were created in the system:

DTrumpet PING

Posted: March 28, 2006 | Category: Flooders
This flooder is designed for freezing servers by constant pinging. It causes a DoS attack. Some flooders are designed for jamming IRC and MSN channels. Such pesky applications can also contain some nasty 'surprises' such as 'backdoors' trojans etc. This flooder was created in November, 1994. The following files were created in the system:

Final Fortune 2.4

Posted: March 28, 2006 | Category: Flooders
This application is designed as a trojan which sends a big amount of useless data to a specified PC. Such applications are often used on IRC channels to disturb communications. However, almost every self-respecting IRC channel is protected by special Flood detection algorithms. The primary function of flooders is DoS attack. The following files were created in the system:

FloodBot

Posted: March 28, 2006 | Category: Flooders
Designed for flooding in chat-applications, this application attacks IRC channels with a massive load of worthless data. It slows or even jams the channel. Although IRC channels try to protect themselves, there are always new flooders arriving, which find a weak spot in security and attack chats. Some flooders may also have the 'nucker' ability. It means that they will try to damage registry, key files and corrupt other vital info. The following files were created in the system:

Flooder Lagger

Posted: March 28, 2006 | Category: Flooders
Such applications are designed for attacking servers, IRC and MSN channels and even e-mails. The term 'flood' means sending a large amount of data to a channel, constantly pinging a server, or sending junk-emails to someone. Such actions may cause a DoS attack, and completely freeze the server. The application was created in January, 2003, it needs 33 Kb place for storage. The following files were created in the system:

Flood.MSN

Posted: March 28, 2006 | Category: Flooders
This application is designed for flooding the MSN Messenger. It sends a massive amount of useless information, until the channel is jammed or connection speed critically falls. Although, many MSN channels are protected from such pests with a special Flood detection algorithms, the risk of being attacked by such virus is high. The following files were created in the system:

Backdoor.IRC.Floodz

Posted: March 28, 2006 | Category: Flooders
This application is designed for overloading your connection. The method is quite simple - is continuously sends pinging packets and that causes a DoS attack. It also includes a very dangerous 'backdoor' function. The hacker can gain full access to your computer. Some newer variants appeared from April, 2004 to April, 2004. The following files were created in the system:

Backdoor.IRC.Fusion.20

Posted: March 28, 2006 | Category: Keyloggers
This application overloads the connection by pinging. That causes a DoS attack. 'DoS' attack means 'Denial of Service'. It is a way to prevent users of using some kind of service. Hackers usually try to corrupt the work of server, or 'flood' your messenger But flooders can also used for e-mail flooding. The following files were created in the system:

Death Scythe 2.40

Posted: March 28, 2006 | Category: Flooders
This application overloads the connection by pinging. The primary functions of such applications are jamming IRC and other chat channels, and freezing servers by constant pinging. Some flooders may include the ability to install a 'backdoor' allowing the hacker to gain full remote control over your PC, or have a very nasty 'nucker' ability, that can seriously damage your PC. The following files were created in the system:

Flooder.Chat.VB.c

Posted: March 28, 2006 | Category: Flooders
This application overloads the connection by pinging. That causes a DoS attack. DoS attacks may affect the work of your server or jam IRC channels. Some flooders may include the ability to install a 'backdoor' allowing the hacker to gain full remote control over your PC, or have a very nasty 'nucker' ability, that can seriously damage your PC. The following files were created in the system:

NT Shareme Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous trojan, which usually infects the computer as a part of HTML code, written in Java Script, is always a real danger for computer's stability and security. NT Shareme Trojan acts by using holes in the security computer of the Internet Explorer. This technique lest this spyware to install other hostile applications, that's why removing this pest from the infected machine would be the best decision. The following files were created in the system:

NTIS Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious spyware is a trojan, which means that it usually concentrates on damaging one single computer, instead of trying to infect as many PCs as possible. NTIS Trojan acts by damaging many computer files, which are responsible for proper computer working, that's why it’s always recommended to get rid of this pest as soon as possible. The following files were created in the system:

Obliterate Trojan

Posted: March 28, 2006 | Category: Trojans
This trojan is a good example of a really destructive spyware, which is always able to damage the infected computer. Obliterate trojan specializes in overwriting many files. By using its specific algorithm, this pest is always waiting for user's attempt to change file attributes and, in case such attempt is detected, removes this file. The following files were created in the system:

OhBaby Trojan

Posted: March 28, 2006 | Category: Trojans
Although this trojan was created in 1997 and nowadays it's unable to damage many modern computers, it still is quite a big threat for those users, who have old operating computers and no good defence installed. OhBaby Trojan usually damages several critical computer files, which are responsible for computer's stability and performance. The following files were created in the system:

Open Pass

Posted: March 28, 2006 | Category: Trojans
This malicious application is a trojan, but not a password capturer. Open Pass specializes in one thing: it simply operates with login fields of many computers. When a user enters his or her password in such fields, this spyware doesn't allow the computer to make it invisible by showing '*' symbols. This method may often lead to losses of different private information, that's why detecting and removing Open Pass as soon as possible would be a wise decision. The following files were...

Optimize Trojan

Posted: March 28, 2006 | Category: Trojans
Optimize Trojan was created in 1998, but even today it may cause a lot of problems for those users, who have no reliable defence installed on their PCs. This spyware usually sneaks silently into a target machine and performs a set of destructive actions, which may seriously harm the stability of the infected PC. The following files were created in the system:

Optimizer Trojan

Posted: March 28, 2006 | Category: Trojans
Instead of perform the optimisation of the infected computer, this spyware is usually performs many destructive actions , which are a potential threat for the stability and security of the infected computer. It's always recommended to remove Optimize Trojan from the infected machine as soon as possible. The following files were created in the system:

OuterLimit Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious application usually tries to sneak silently into a target PC via many Internet resources, such as peer-to-peer networks or suspicious e-mail messages from unknown senders. OuterLimit Trojan is always a reason of many troubles on the infected machine, that's why removing it as soon as possible would be the best decision. The following files were created in the system:

Cvir Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious application usually pretends being an antiviral application, but instead of searching and removing viruses, attempts to erase the hard disk of the infected machine. Cvir Trojan shows the following message in case of success: 'HAHA God your a f*cking moron. YOU HAVE BEEN HIT BY A TROJAN! HAHA'. The following files were created in the system:

Pall Trojan

Posted: March 28, 2006 | Category: Trojans
Although this trojan is sometimes being classified as a joke and performs only annoying actions on the infected PCs, it still is quite a big threat and can lead to many performance problems. It is greatly recommended to keep your antiviral application updated in order to prevent your computer from getting infected. The following files were created in the system: