Postalot Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious software is a backdoor trojan, which is able to provide the anonymous hacker with a partial access to the infected computer. With the help of Postalot Trojan, the hacker gets an ability of carrying a lot of destructive actions onto the machine. These actions are always a potent threat for the stability and the security. The following files were created in the system:

PowerOff Trojan

Posted: March 28, 2006 | Category: Trojans
This destructive trojan may often become a reason of some serious troubles for the user of the infected machine. After sneaking into the PC, PowerOff Trojan is regularly trying to switch the PC off. This simple but really effective technique is often a main reason of the loss of important data and computer stability. The following files were created in the system:

Predator Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious software acts in a way, which is described in its name. As a real predator, this spyware attacks its victim suddenly from many Internet locations and performs a lot of actions on the infected machine. These actions may often paralyse the PC or cause several critical computer errors. The following files were created in the system:

PrintSpitter Trojan

Posted: March 28, 2006 | Category: Trojans
This parasitic trojan was designed for damaging printers, installed on the infected computer. Activities of this pest may result in several problems with your printer. What is more, not only printers are affected by the PrintSpitter Trojan; this trojan also modifies many computer components, which are responsible for the proper computer working. The following files were created in the system:

Process Trojan

Posted: March 28, 2006 | Category: Trojans
Even though Process Trojan, which was created in 1996, is quite old and unable to harm many modern computers, this trojan still is quite a serious threat for those users, who have no good defence installed on their old machines. Process Trojan usually kills many critical computer processes, which are often vitally important for the stability of the machine. It is always a good choice to detect and remove this spyware from the infected PC as soon as possible. The following files were...

Protect Trojan

Posted: March 28, 2006 | Category: Trojans
If no actions against this spyware are taken soon after getting infected, a lot of serious problems may occur. Protect Trojan doesn't protect the infected computer from anything; what is more, the computer usually requires protection against this pest. It is always recommended to remove this spyware from the infected machine in order to avoid many negative consequences, such as the loss of important data. The following files were created in the system:

PrtF Trojan

Posted: March 28, 2006 | Category: Trojans
PrtF Trojan usually infects a target computer from many Internet resources, such as suspicious web pages, newsgroups or peer-to-peer networks. This spyware usually performs a set of destructive actions, which usually lead to unwanted consequences on the infected machine. The following files were created in the system:

PS Trojan

Posted: March 28, 2006 | Category: Trojans
This trojan is a potent threat for every user of the infected computer. By using its specific stealth algorithms, PS Trojan gets into the computer and starts its malicious activities, such as deleting many files and stealing private information. The following files were created in the system:

PS2 Emulator

Posted: March 28, 2006 | Category: Trojans
This malicious application can become a reason of many annoying problems for the user. PS2 Emulator performs a set of different actions, which are sometimes really disturbing the user of the infected machine. These actions often lead to the download of different suspicious files and many computer changes. It's strongly recommended to get rid of this pest by using a reliable antiviral computer. The following files were created in the system:

Psyber Trojan

Posted: March 28, 2006 | Category: Trojans
This backdoor trojan is a dangerous spyware, which is always able to make a lot of problems for the user of the infected computer. Psyber Trojan gives the anonymous hacker an ability to remotely control the infected machine by performing many actions on it. These actions may vary from harmless annoying jokes to dangerous computer changes. The following files were created in the system:

PsySend Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware is a trojan; this means it doesn't strive to make as many copies of it as possible and send them to many addresses, but concentrates on damaging one specific PC. PsySend Trojan is able to remove or modify many computer files, which are vitally important for the reliable computer working, that's why it's tremendously important to keep your computer protected from PsySend Trojan. The following files were created in the system:

Punttek Trojan

Posted: March 28, 2006 | Category: Trojans
Punttek Trojan is a spyware, which specializes in harming AOL users. This spyware is able to perform a wide variety of actions, such as password stealing, exploiting, do DoS attacks. All in all, this pest is really dangerous, that's why it's advisable to remove it from the infected computer as soon as possible. The following files were created in the system:

Push Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious software is a trojan, which was written in 2003 in Turbo Pascal language. Push Trojan usually claims to be a hard disk optimizer, but instead of performing useful actions it shows many annoying messages, randomly picked from the code. Although there shouldn't be anything to worry about, because this pest is quite harmless, it's still recommended to remove Push Trojan from the infected computer as soon as possible. The following files were created in the system:

Puto Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware is a dangerous destructive tool, which is able to perform a lot of damage on any computer with no reliable security installed on it. Puto Trojan is usually performing a lot of actions, which are a potential threat for computer's stability and performance. The following files were created in the system:

Fente Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous spyware specializes in stealing many passwords from the infected computer and sending them to the specified location. This technique is always a tremendous threat for the privacy of every user, that's why it's strongly advisable to get id of this pest as soon as possible. The following files were created in the system:

Thief Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious software is a trojan, which specializes in stealing many passwords. This technique is usually a potent threat for every user of the infected machine, that's why removing this spyware as soon as possible would be the best decision available. The following files were created in the system:

QAdvert Trojan

Posted: March 28, 2006 | Category: Trojans
Although this spyware is quite old and many modern computers are immune to its activities, it still is quite a big threat for older machines. After sneaking into a machine, QAdvert Trojan begins its destructive activities, which may lead to many consequences: from annoying effects to serious memory and performance losses. The following files were created in the system:

QB2C.Duck Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious application is a trojan; this means it doesn't strive to send its copies to many addresses, but simply concentrates on damaging one specific PC. QB2C.Duck Trojan was written with the help of QB2C translator, that's why in some certain circumstances it may even harm the UNIX computer. The following files were created in the system:

QB2C.Fly Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous spyware, which was created with the help of QB2C translator, is often a dangerous tool of destruction in the hands of any hacker. QB2C.Fly Trojan usually performs a set of harmful actions on the infected machine; these actions always result in many unwanted consequences, such as the loss of performance. The following files were created in the system:

QB2E.Process Trojan

Posted: March 28, 2006 | Category: Trojans
Although this pest is really old, there are a lot of its variations, that's why there's no guarantee that your antiviral computer will detect and remove this spyware . QB2E.Process Trojan acts by damaging many files and processes on the infected machine; this technique is always a serious threat for the computer, that's why removing this trojan from the infected PC as soon as possible would be the best decision available. The following files were created in the system: