Rivvi Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware, which was created in 2004, has already affected a lot of PCs and there is no guarantee that your PC can escape from Rivvi Trojan if there's no reliable defense installed on it. If no actions against this trojan are taken immediately after getting infected, many unwanted problems may occur. The following files were created in the system:

Rmhpy99

Posted: March 28, 2006 | Category: Trojans
This software was designed for detecting and removing the 'Happy New Year' virus. It usually performs these actions, but, what is more, this spyware has also an ability of mining some specific data on the infected computer and sending this information to the specific Internet location. This action usually compromises the user's privacy, that's why a careful treatment of Rmhpy99 is recommended. The following files were created in the system:

Rob Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware is quite old, but still able to become a reason of many problems for many users. By hitting different key files and computer components, Rob Trojan makes the computer work in improper way. It's always a good decision to keep your antiviral databases in order to protect your machine from this pest. The following files were created in the system:

Rocket Trojan

Posted: March 28, 2006 | Category: Trojans
Rocket Trojan is a dangerous spyware, which often sneaks into the target computer from many Internet resources, web sites of suspicious content or e-mail messages from unknown senders. This pest specializes in damaging many critical computer components, which are responsible for the proper computer working and stability. The following files were created in the system:

RevengePack Trojan

Posted: March 28, 2006 | Category: Trojans
This backdoor trojan is sometimes used by hackers for breaking into the computer and performing many destructive actions there. RevengePack Trojan provides the hacker with an ability of stealing different confidential data, such as private messages and passwords. The following files were created in the system:

RTMS Trojan

Posted: March 28, 2006 | Category: Trojans
RTMS Trojan is a powerful destructive tool, which is always able to carry a lot of destruction into the target PC, if there's no good defense installed on it. If no actions against this spyware are taken immediately after getting infected, many problems may occur. The following files were created in the system:

Rumble Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware is a batch-file infector, which is always a potential threat for every user, who has no reliable security installed on his or her PC. After its first run, Rumble Trojan searches for BAT-files and infects them with its own copy. This procedure may lead to many problems, because there might be several critical BAT-files infected. The following files were created in the system:

Rumor 11

Posted: March 28, 2006 | Category: Trojans
Although this spyware is almost harmless, it still may become a reason of several problems, that's getting rid of Rumor 11 would be the best choice. This pest usually acts by showing one message of annoying content from time to time. The following files were created in the system:

RunAuto Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware is a trojan downloaded. RunAuto Trojan connects to several Internet resources and downloads many applications from there. There may be several spywares among the downloaded software, that's why it's always a good decision to get rid of RunAuto Trojan as soon as possible. The following files were created in the system:

Runme2 Trojan

Posted: March 28, 2006 | Category: Trojans
This pest is a dangerous trojan, which is always able to harm the infected PC. Runme2 Trojan acts by deleting searching for and deleting the command.com file. This file is one of the key computer components, that's why the loss of this file usually result in computer instability and, sometimes, the loss of performance. The following files were created in the system:

Runwin32

Posted: March 28, 2006 | Category: Trojans
This destructive spyware is a trojan, which was designed with one aim of sneaking into a specific PC and stealing many data from it. Several important passwords may be stolen and sent to the specified location. What is more, this spyware searches for antiviral processes and kills them; this technique allows Runwin32 to perform its actions for a long time and produce even more destruction. The following files were created in the system:

Santa Trojan

Posted: March 28, 2006 | Category: Trojans
This trojan usually ties to sneak silently into the computer from many Internet resources, such as suspicious web pages or peer-to-peer networks. After infecting the machine, Santa Trojan performs a set of destructive actions on it; these actions often result in computer instability or the loss of performance. The following files were created in the system:

Satana Trojan

Posted: March 28, 2006 | Category: Trojans
If no actions against this spyware are taken soon after infection, many different problems may occur. Satana Trojan usually acts by hitting many key computer components; the loss of them always result in serious troubles. The following files were created in the system:

Sabine Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware is a trojan, which concentrates on damaging one infected computer instead of trying to infect as many other PCs as possible. Sabine Trojan sneaks silently into the target machine and starts performing its set of destructive actions; these actions often result in many negative effects, that's why it's strongly recommended to get rid of this pest as soon as possible. The following files were created in the system:

SBG

Posted: March 28, 2006 | Category: Trojans
SBG is a spyware, which damages computer's stability in a specific way. This trojan generates many batch-files and puts them in different directories. This technique is especially dangerous, because several key files might be replaced with infected files. The following files were created in the system:

Schizo Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous trojan is a spyware, which is always dangerous for the infected computer. If no actions against it are taken soon after getting infected, Schizo Trojan may become a reason of many troubles, such as the loss of important data. It's always a wise choice to keep your antiviral software up-to-date in order to protect your PC from getting infected. The following files were created in the system:

Scramble Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious software is a trojan, which is always a dangerous threat for every user, who has no reliable defense installed on his or her PC. Scramble Trojan acts by making several copies of every file found on the hard disk. This technique is tremendously annoying, though not really destructive. It can take a lot of time for the user to clean all junk files, that's why it's always better to prevent this infection by keeping antiviral databases updated. The following files were...

Screen Mate Poo

Posted: March 28, 2006 | Category: Trojans
This malicious application is a trojan, which is always a potent threat for those users, who haven't got reliable defense installed on their PCs. Screen Poo Mate is able to perform a lot of actions, which are often harmless, but really annoying. It's always a good decision to get rid of this pest as soon as possible. The following files were created in the system:

Screen Shaker

Posted: March 28, 2006 | Category: Trojans
Screen Shaker is quite harmless trojan, which is unable to damage anything on the infected machine. In spite of that, this spyware is able to annoy the user by continuously shaking the screen. This technique can often lead to the loss of user's work productivity, that's why removing Screen Shaker as soon as possible would be the best choice possible. The following files were created in the system:

SDTE Trojan

Posted: March 28, 2006 | Category: Trojans
SDTE is a trojan, which usually sneaks into the computer and performs a set of destructive actions, which usually compromise the user's privacy and computer performance. SDTE uses its simple but really effective algorithms for data mining, sending this data to the specified location and performing different computer changes, which often result in negative side effects. The following files were created in the system: