See The World

Posted: March 28, 2006 | Category: Trojans
If no immediate actions against this spyware are taken soon after getting infected, See The World may become a real headache for the user of the infected machine. This pest performs a set of actions, which are really dangerous for the stability and performance of the infected computer. The following files were created in the system:

SeekRep Trojan

Posted: March 28, 2006 | Category: Trojans
SeekRep Trojan usually infects the computer from many Internet resources, such as peer-to-peer networks, newsgroups or even chats. This spyware is a potent threat for the stability and the security of the infected PC, that's why getting rid of it as soon as possible is always a good choice. The following files were created in the system:

ServU Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous trojan is a destructive tool in the hands of the hacker, who wants to break into a specific machine and perform many destructive actions there. ServU Trojan corrupts many critical computer components and makes the PC work in the unstable way. The following files were created in the system:

SevenUp

Posted: March 28, 2006 | Category: Trojans
This dangerous spyware is a trojan, which sneaks silently into the computer and starts performing its malicious activities. These activities include stealing many confidential pieces of data, such as private messages or passwords. SevenUp usually conpromises the user's privacy, that's why getting rid of this spyware as soon as possible would be the best choice. The following files were created in the system:

SexQuiz Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous spyware is a trojan; this means it doesn't strive to make as many copies of it as possible and send them to different addresses, but simply concentrates on one specific PC. SexQuiz Trojan performs a set of destructive actions, which are often able to damage computer's stability and lead to the loss of important data. The following files were created in the system:

SexTest Trojan

Posted: March 28, 2006 | Category: Trojans
Although this trojan was released to the wild a long time ago, it is still able to damage many modern PCs, that's why a careful attitude towards it is recommended. SexTest Trojan waits for the user to run the main infected file, and starts performing its destructive actions right after first run. Consequences of this trojan's activities are really hard to eliminate, that's why romoving this spyware as soon as possible would be a wise decision. The following files were created in the...

Sexu Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous trojan usually sneaks into the target computer via many Internet resources and starts performing its destructive activities. These activities usually lead to unwanted effects, such as computer reboot or shutdown, and may cause some serious losses of important data. The following files were created in the system:

Shadow98 Trojan

Posted: March 28, 2006 | Category: Trojans
Even though Shadow98 Trojan was created in 1998 and many modern PCs are simply immune to its activities, it is always recommended to keep your antiviral software updated in order to prevent your machine from getting infected with this spyware. Shadow98 Trojan performs a set of destructive actions, which may usually cause to the computer instability and the loss of performance. The following files were created in the system:

ShareAll Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious application is a trojan, which is able to modify many settings of the infected computer. These changes always lead to unwanted consequences, such as hard disk sharing. As a result of this trojan's activities, everyone may freely access the private information, which is stored on the infected PC. The following files were created in the system:

Sharecom Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious application is a trojan, which usually concentrates on damaging one specific PC instead of sending its copies to many addresses. Sharecom Trojan acts by making different changes in computer settings and files ; this technique often leads to the loss of important data and performance. The following files were created in the system:

Shark Trojan

Posted: March 28, 2006 | Category: Trojans
Shark Trojan is a parasitic trojan, which sneaks silently into the computer from many Internet resources, such as suspicious web pages and chats. Although most of modern antiviral applications detect and remove this pest, it still may become a reason of many problems for those users, who have no good and reliable defene installed on their machines. The following files were created in the system:

Shine Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware is a combination of trojan and worm; this means its destructive power is really dangerous and it has a many methods for damaging the infected computer. Right after its first run, Shine Trojan starts performing its harmful activities, which often result in serious conseuences . It's strongly recommended to detect and remove this pest from the infected machine as soon as possible. The following files were created in the system:

Shock Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious application is also able to shock the user of the infected computer, because its actions are really destructive and may result in many computer troubles. What is more, if no actions against this spyware are taken immediately after getting infected, it is able to produce even more destruction and lead to very sad consequences, such as a full loss of tremendously important data. The following files were created in the system:

Simon

Posted: March 28, 2006 | Category: Trojans
This backdoor trojan was created in 2002 with the help of WWPack32 applicationming tool. The main aim of Simon is sneaking into the target PC and giving the anonymous hacker a remote control over the infected machine. In case of success, the hacker gets a wide variety of methods, which can seriously damage the stability and the security of the computer. For example, the hacker can steal confidential information . The following files were created in the system:

SincTool Trojan

Posted: March 28, 2006 | Category: Trojans
SincTool Trojan is a really dangerous tool in the hands of experienced hackers. This spyware often tries to detect and remove the antiviral software, which is installed on the target PC, and, in case of success, starts performing its destructive actions. These actions always result in several negative effects, such as computer crashes or the loss of important data. The following files were created in the system:

Sisia Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware is a trojan, which usually hits the computer from many Internet locations, such as suspicious web sites, newsgroups or even chats. Sisia Trojan usually corrupts some certain key computer files and components, which are often responsible for the proper computer working. The following files were created in the system:

Skinhead Trojan

Posted: March 28, 2006 | Category: Trojans
There are no doubts about the destructive power of this trojan. Skinhead Trojan is always able to produce a great destruction onto the target PC, that's why it's strongly recommended to keep your antiviral databases up-to-date in order to prevent your machine from getting infected with this spyware. The following files were created in the system:

Skism Trojan

Posted: March 28, 2006 | Category: Trojans
Although this spyware is really old and simply unable to damage many modern PCs, it's still able to harm seriously some certain types of old operating computers, that's why users of old machines should always beware of Skism Trojan. The following files were created in the system:

Slavik Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous spyware is a trojan, which usually specializes in damaging one specific PC instead of trying to infect as many machines as possible. Slavik Trojan performs a set of destructive actions, which are often quite a big threat for computer's stability and performance. The following files were created in the system:

Sleepe Trojan

Posted: March 28, 2006 | Category: Trojans
This trojan was created right after the terrorist attack on WTC and is dedicated to that act. Sleepe Trojan is some kind of PC terrorist, which performs many destructive actions, aimed to ruin the stability and the performance of the infected machine. The following files were created in the system: