Patch Registry Trojan

Posted: March 28, 2006 | Category: Trojans
After sneaking silently into the target computer, Patch Registry Trojan starts its destructive activities instead of patching the computer registry in a useful way. Actions, available to this spyware, may often result in several serious troubles , that's why removing it as soon as possible would be the best choice. The following files were created in the system:

Paul Trojan

Posted: March 28, 2006 | Category: Trojans
Although this trojan is easy to recognise and remove with the help of many modern antiviral computers, it is still able to sneak into several computers and perform its destructive actions there. Paul Trojan is able to modify many computer components and files, which are vitally important for the proper computer working and its stability. The following files were created in the system:

PegaSalas

Posted: March 28, 2006 | Category: Trojans
This malicious application is always a potential threat for those users, who don't have any reliable security computers installed on their PCs. PegaSalas usually sneaks silently into the computer via many suspicious Internet resources or e-mail messages from unknown senders. This spyware infects different critical computer components; this usually results in serious consequences, such as the loss of performance. The following files were created in the system:

Penis Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware is always dangerous for those users, who have no good defence installed on their computers. Penis Trojan usually acts by overwriting many files with a copy of itself; this technique always leads to different negative consequences . It's always recommended to keep your antiviral software updated in order to protect your machine from this pest. The following files were created in the system:

PentHouse Trojan

Posted: March 28, 2006 | Category: Trojans
Although the first version of this trojan was detected in 1992, which means that this spyware is really old, there may always be several modern variations, which are able to harm any computer seriously. PentHouse Trojan acts in a way, similar to the way many trojans act - it simply modifies the content of many critical files, which are responsible for the stability of the computer. The following files were created in the system:

Percent Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous trojan usually acts by infecting and harming one specific computer, instead of sending its copies to many addresses. Percent Trojan acts by corrupting different important files; this technique is always a threat for the stability of the infected machine, that's why staying protected from this spyware would be the best decision. The following files were created in the system:

Phantom Trojan

Posted: March 28, 2006 | Category: Trojans
Even though Phantom Trojan is quite old and many modern operating computers are immune to its activities, its threat still shouldn’t be underestimated. With the help of this quite powerful tool, the hacker gets a partial control over the infected computer; her or she is able to change many computer settings or even simply steal different pieces of confidential information . The following files were created in the system:

Phine Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous BAT-trojan is a potential threat for every computer, which has no defence installed on it. Phine Trojan usually acts by searching for BAT-files and infecting them with the copy of its own code. This method makes the infection really hard to remove completely and, as a result, provides Phine Trojan with more time fore its destructive activities. The following files were created in the system:

PHP Logger

Posted: March 28, 2006 | Category: Trojans
This pest often strikes the computer from many Internet resources as a part of PHP code. In case of success, PHP Logger sneaks into the computer and starts performing its actions, which are always a serious threat for computer's security and privacy. Among actions, available to this spyware, are several really dangerous ; that's why it would be the best decision to remove PHP Logger from the infected machine as soon as possible. The following files were created in the system:

Picture Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious application may become a real threat for the security and privacy of the infected computer. By using its specific algorithms, Picture Trojan is able to steal many passwords and other confidential information; this information is always freely available for the hacker. The following files were created in the system:

Pisces trojan

Posted: March 28, 2006 | Category: Trojans
This spyware usually specializes in breaking AOL security, which is always a very attractive aim for many hackers. Once run on the infected machine, Pisces Trojan gives the hacker a partial remote control over the computer; the hacker then gets an ability of stealing many passwords and performing other destructive actions. The following files were created in the system:

PKZ300 Trojan

Posted: March 28, 2006 | Category: Trojans
This destructive trojan is a potential threat for every computer. Fortunately, there is a bug in this trojan's code; originally, PKZ300 Trojan was created for silent format of the hard disk, but the DOS procedure, which is responsible for that, asks the user for confirmation. Serious consequences can be avoided simply by restarting the computer after the following message appears on the screen: The following files were created in the system:

PKZap Trojan

Posted: March 28, 2006 | Category: Trojans
If no actions against this spyware are taken soon after getting infected, it may become a reason of many problems. PKZap Trojan corrupts many key files, which are responsible for proper and stable computer working, that's why removing this pest from the infected machine as soon as possible would be the right decision. The following files were created in the system:

Plasming Trojan

Posted: March 28, 2006 | Category: Trojans
This trojan usually sneaks silently into the computer from many Internet resources, such as suspicious web pages or peer-to-peer networks. After infecting the computer, Plasming Trojan starts performing its malicious activities, which may often lead to partial or complete loss of data, instable computer working, the loss of performance, etc. The following files were created in the system:

Plato Trojan

Posted: March 28, 2006 | Category: Trojans
Plato Trojan is always a threat for unprotected computers, that's why it's recommended to have your PC protected with an updated antiviral computer. This spyware usually acts by damaging many critical computer components and files; the loss of these files usually results in computer instability and performance. The following files were created in the system:

Pluto Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious software specializes in infecting the IRC clients and giving the hacker a partial control over these applications. With the help of Pluto trojan, the hacker gets an ability of stealing many confidential messages from IRC. This technique is always a threat for the user's security and privacy, that's why it's strongly recommended to remove Pluto Trojan from the infected machine as soon as possible. The following files were created in the system:

Pmanager.exe

Posted: March 28, 2006 | Category: Trojans
This software has an ability of mining specific data and sending it to the specified address. This technique is usually quite a big threat for the user's privacy and security, that's why it's strongly recommended to keep your antiviral application up-to-date in order to prevent your computer from getting infected. The following files were created in the system:

PNTask Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous backdoor is always a threat for the user's security and privacy. With the help of PNTask Trojan, the hacker gets a remote access to the infected PC. The hacker is able to make a lot of problems for the infected machine; these problems often result in different negative effects, such as the loss of private data or the loss of performance. The following files were created in the system:

Pokemon Trojan

Posted: March 28, 2006 | Category: Trojans
There are no doubts, that this spyware is a powerful and dangerous trojan, which is always able to damage the infected computer. By using its specific stealth algorithms, Pokemon Trojan sneaks into the computer and performs a set of destructive actions, which usually result in many negative consequences . The following files were created in the system:

Porno Trojan

Posted: March 28, 2006 | Category: Trojans
If no actions against this trojan are taken soon after getting infected with it, Porno Trojan may become a reason of many unwanted consequences. These include improper computer working, different changes in softwares , the loss of performance and important data, etc. The following files were created in the system: