RealDie Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware is a trojan, which usually concentrates on damaging one specific PC instead of sending its copies to many addresses. RealDie Trojan is a powerful tool of destruction, which is able to lead to dangerous effects, such as computer instability or the loss of performance. The following files were created in the system:

Rebooter Trojan

Posted: March 28, 2006 | Category: Trojans
As it is clear from the name of this pest, Rebooter Trojan specializes in harming the infected PC by rebooting it. What is more, this spyware writes itself into the start-up and starts working each time when the Windows starts. Although Rebooter Trojan carries no destructive payloads, its actions are always very annoying and can even lead to the loss of important data. The following files were created in the system:

Recker Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious application is a trojan, which always specializes in harming one particular PC. Recker Trojan acts by creating many files with some certain protection, which doesn't allow anybody to remove these files. This method is really annoying and disturbing, that's why it's strongly recommended to keep your antiviral databases updated in order to prevent this trojan from getting into your machine. The following files were created in the system:

RedGhost

Posted: March 28, 2006 | Category: Trojans
This dangerous trojan is a backdoor, which means that it is being used by the hacker for getting a control over the infected computer. The hacker gets an ability of changing many settings on the infected machine or stealing different pieces of private information, such as passwords and confidential messages. The following files were created in the system:

Reg Raper

Posted: March 28, 2006 | Category: Trojans
Reg Raper is a trojan, which usually tries to sneak silently into the computer from many suspicious Internet resources, such as newsgroups or peer-to-peer networks. This spyware usually makes a lot of changes into the Windows registry; these changes often result in the unstable computer working and other side effects. The following files were created in the system:

REG ShareC Trojan

Posted: March 28, 2006 | Category: Trojans
REG ShareC Trojan usually sneaks into PC and shares its hard disk to the Internet users. This technique is a tremendous threat, because many malicious applications might be installed on the victim's PC and, what is more, the loss of confidential data may occur. The following files were created in the system:

RegBack Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware is a backdoor, designed for giving the control over Windows NT computers to the anonymous hacker. The hacker is able to perform a wide variety of actions one the infected machine; these may vary from harmless or annoying jokes to brutal ones, such as erasing critical files. It is strongly recommended to keep your antiviral application up-to-date in order to protect your PC from RegBack Trojan. The following files were created in the system:

RegKill Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous spyware is a trojan, which specializes in changing registry entries on the infected PC. RegKill Trojan changes attributes of EXE-files, so they become registered as TXT-files. This technique is often a reason of many negative effects, such as computer instability or the loss of performance. The following files were created in the system:

Reid Trojan

Posted: March 28, 2006 | Category: Trojans
Reid Trojan is a potential threat for every user, who has no reliable security installed on his or her PC. By using its modern and really effective engine, this spyware sneaks into the computer and performs a set of destructive actions, which often become the reason of many problems with computer's stability and performance. The following files were created in the system:

Remote Commands

Posted: March 28, 2006 | Category: Trojans
This backdoor trojan has a lot of actions available to it; all these actions can harm the user of the infected computer in many ways. For example, the hacker is able to steal different pieces of confidential data or make the infected computer shutdown. All in all, this spyware is tremendously dangerous for every user of the infected machine, that's why it's strongly recommended to get rid of Remote Commands as soon as possible. The following files were created in the system:

Remote Control Panel

Posted: March 28, 2006 | Category: Trojans
This trojan horse, which was designed to control Windows 95/98/ME/NT/2000 computer, is always a dangerous tool of destruction in the hands of a hacker. Many negative effects may occur on the machine, which is infected with a Remote Control Panel; these effects vary from unwanted and annoying jokes to computer instability and the loss of important information. The following files were created in the system:

Renamer Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious application is a trojan, which usually tries to damage one particular computer instead of trying to infect as many machines as possible. Renamer Trojan acts by renaming many files ; this method always leads to computer instability and improper working. The following files were created in the system:

Reni Trojan

Posted: March 28, 2006 | Category: Trojans
Reni Trojan is a dangerous backdoor trojan, which uses the vulnerability of the Internet Explorer for sneaking into the PC. This spyware usually infects the computer from HTML-files, that's why it's strongly recommended not to open any suspicious HTML-files. Reni Trojan gives the hacker a remote access to the infected machine, providing him or her with a possibility of performing many destructive actions . The following files were created in the system:

Replacer.exe

Posted: March 28, 2006 | Category: Trojans
Although this spyware is quite old and several types of modern computers are simply immune to the Replacer.exe. This pest usually sneaks into the computer from many Internet resources and starts performing its destructive activities. These activities include replacing original files with a copy of a trojan; this technique is really dangerous, that's why complete removal of this spyware as soon as possible would be a wise choice. The following files were created in the system:

Resident Evil

Posted: March 28, 2006 | Category: Trojans
If no immediate actions against this backdoor area taken soon after getting infected, Resident Evil may become a source of many problems, such as the loss of confidential information. With the help of this spyware, the anonymous hacker can get partial or even full control over the infected machine; that's why keeping your antiviral software updated would be a good decision. The following files were created in the system:

Revenge Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous trojan is a potential threat for those users, who have no good and reliable defence installed on their PCs. Revenge Trojan provides the anonymous hacker with a partial control over the infected machine. The hacker can modify many computer components and files, some of which are critically important for the proper computer working. The following files were created in the system:

Reversi Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware is a trojan, which is still able to harm a lot of computes, despite the fact that it was created in 1998. Reversi Trojan usually tries to sneak into the target PC and start performing its destructive activities there. These acivities may often result in serious problems, such as the loss of important data or unstable computer working. The following files were created in the system:

Revun Trojan

Posted: March 28, 2006 | Category: Trojans
Revun Trojan is a trojan, which usually concentrates on damaging one specific PC instead of trying to infect as many machines as possible. If no actions against this spyware are taken soon after getting infected, Revun Trojan can produce a lot of destructive actions and lead to different negative effects . The following files were created in the system:

RFF Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious trojan is usually being used as a tool for many DDoS attacks. These attacks are often aimed to harm many big well-known Internet projects. By using a lot of PC, which are infected with RFF Trojan, simultaneously hackers connect to these sites; this procedure can lead to temporary inaction of these services. The following files were created in the system:

RingZero Trojan

Posted: March 28, 2006 | Category: Trojans
Many hackers, who want to break into a specific PC and steal some certain information from there, are often using this spyware. With the help of RingZero, the hacker can capture user's passwords and other confidential information, such as private messages. It's always recommended to get rid of this pest as soon as possible in order to protect yourself from further problems. The following files were created in the system: