SheepOut Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious software usually sneaks silently into an unprotected computer via many Internet resources, such as peer-to-peer networks or suspicious web pages. Once run on the victim machine, SheepOut Trojan begins its destructive activities, which consist of damaging files of different types and changing many computer settings. These methods make this spyware a real problem for any user of the infected computer, that's why removing it as soon as possible would be a good and wise decision....

QFat Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous trojan is a tremendous threat for any computer with no reliable defence installed because of its brutal destructive actions. QFat Trojan specializes in damaging the hard disk by trying to remove its files. This often leads to partial or complete loss of data, that's why it's always recommended to detect and remove this spyware from the infected machine as soon as possible. The following files were created in the system:

Hood Trojan

Posted: March 28, 2006 | Category: Trojans
Hood Trojan is a spyware, which is always able to harm your computer, if there's no good defence installed on it. This spyware specializes in damaging many critical computers components , which are vitally important for the proper computer working, that's why it's always recommended to keep your antiviral software updated in order to protect your machine from this pest. The following files were created in the system:

QFat16 Trojan

Posted: March 28, 2006 | Category: Trojans
This brutal trojan horse is always a threat for many computers. QFat16 Trojan, which often acts like a typical nuker, was designed for paralysing the computer by damaging its critical components. This always results in a wide variety of problems, such as complete or partial loss of important data, computer instability or the loss of performance. The following files were created in the system:

Franza Trojan

Posted: March 28, 2006 | Category: Trojans
There are no doubts, that this spyware is one of the most serious threats for most of users. Franza Trojan uses its simple, but really brutal algorithms in order to kill a hard disk of the infected machine. In case of success, all data on the hard drive might be lost and tremendously hard to restore. The following files were created in the system:

Loader TEF

Posted: March 28, 2006 | Category: Trojans
This malicious application is always a real threat for the infected computer. Loader TEF uses its specific algorithms in order to bypass security computers and download many spywares into the machine. This technique often results in even more tremendously serious problems, because these downloaded spywares may freely damage many critical computer components. The following files were created in the system:

Annihilation Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous spyware usually sneaks into a computer from many Internet resources, such as suspicious web pages or newsgroups. If no actions against the Annihilation Trojan are taken soon after getting infected, this pest is able to make computer work in unstable way by seriously damaging different critical files. The following files were created in the system:

Loader HST

Posted: March 28, 2006 | Category: Trojans
This dangerous trojan usually perform its harmful activities by connecting to the Internet and downloading other spywares, which also start damaging the computer. This technique is always a serious threat to the stability and the security of the infected PC, that's why it's strongly recommended to detect and remove Loader HST from the machine as soon as possible. The following files were created in the system:

Demo-Gr Trojan

Posted: March 28, 2006 | Category: Trojans
This trojan usually sneaks into the target computer vial many suspicious Internet resources or e-mail messages from unknown senders. Once run on the computer, Demo-Gr Trojan starts performing its harmful activities, which are usually aimed on deleting or damaging key computer components and files. In the result of this infection the computer may start working in unstable way. The following files were created in the system:

FPI Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious application was designed for performing a set of harmful actions on the infected PC. FPI Trojan is a potent threat for computer's stability and performance, that's why it's strongly recommended to keep your antiviral software up-to-date in order to prevent your PC from getting infected with this spyware. The following files were created in the system:

1999 Trojan

Posted: March 28, 2006 | Category: Trojans
Although this pest is quite old and obsolete, it is still able to harm several types of old operating computers, that's why a careful attitude towards 1999 Trojan is recommended. As a result of getting infected with this spyware, many different problems with computer stability and performance may occur. The following files were created in the system:

Off Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware, which is considered to be a close relative of the Fire Trojan, is always a threat for many computers. After sneaking into the machine, Off Trojan starts performing its harmful actions, which usually result in many computer errors and the loss of important data. The following files were created in the system:

Loader.Enter

Posted: March 28, 2006 | Category: Trojans
This malicious application often acts like a typical loader. The Loader.Enter trojan usually acts by connecting to the specified Internet location and downloading many hostile applications from there. These applications are also really dangerous and able to cause computer instability and loss of performance or important data. The following files were created in the system:

LamDie Trojan

Posted: March 28, 2006 | Category: Trojans
LamDie Trojan is a spyware, which is always able to make a lot of troubles for inexperienced users. After sneaking into the computer from many Internet resources , this trojan starts its destructive activities, which are usually aimed to disturbing user's work and causing different annoying effects. The following files were created in the system:

Sad Trojan

Posted: March 28, 2006 | Category: Trojans
Although this spyware is quite old and many modern computers are immune to its activities, the Sad Trojan is still able to make a lot of troubles for those users, who possess old operating computers. By using its special stealth algorithms, this spyware sneaks into the computer and starts installing many hostile applications on the machine. These applications are also parasitic, that's why it's tremendously important to keep your antiviral software updated in order to prevent Sad Trojan from...

RickDogg Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous trojan is quite well-known for its destructive actions, which are dangerous for the majority of modern PC computers. RickDogg Trojan sneaks into the target machine via different Internet resources and starts performing its malicious activities. These activities usually result in serious consequences, such as computer instability or the loss of important data. The following files were created in the system:

Rizzo Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous spyware has a lot of common with a typical loader. This means that Rizzo usually connects to the Internet and downloads many malicious applications from there. These applications are always a potent threat for the user's security and privacy, that's why it's really better to stop this spyware in the early stage of its activity, than fight with a lot of dangerous and destructive viruses. The following files were created in the system:

Viruscan Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious application usually claims to be antiviral software, that's why a lot of inexperienced users may mistakenly run it on their PCs. After that, Viruscan Trojan starts damaging many critical components, instead of searching for viruses. This technique is always a real threat for the infected machine, that's why it's always recommended to remove this pest as soon as possible. The following files were created in the system:

Bones Trojan

Posted: March 28, 2006 | Category: Trojans
Bones Trojan is a harmful spyware, which is usually quite a big threat for every computer with no proper security installed on it. This trojan acts by damaging many vitally important computer components, that's why it's tremendously important to detect and remove Bones Trojan from the infected machine as soon as possible. The following files were created in the system:

QHA Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous spyware is a trojan; this means it doesn't try to send its copies to as many addresses as possible, but simply concentrates on harming one specific PC. QHA Trojan hits vitally important computer components, which are responsible for proper computer working and its stability. The following files were created in the system: