Tunnel Trojan

Posted: March 28, 2006 | Category: Trojans
Tunnel Trojan is a dangerous backdoor, which is able to provide the hacker with a remote control over the infected computer. The hacker gets an ability of performing many destructive actions, such as stealing passwords or confidential e-mail messages. Tunnel Trojan strongly compromises the user's privacy and should always be removed from the machine as soon as possible. The following files were created in the system:

Alpha Trojan

Posted: March 28, 2006 | Category: Trojans
This backdoor trojan is extremely powerful and dangerous, that's why staying protected from it by keeping your antiviral software up-to-date is strongly recommended. Alpha Trojan gives the anonymous hacker a full access to the infected machine. The hacker is then able to download or upload different files, run many softwares on the victim's PC, steal confidential information, etc. The following files were created in the system:

Typhoon Trojan

Posted: March 28, 2006 | Category: Trojans
Typhoon Trojan is a dangerous spyware, which is often able to perform actions of a great destructive power. Once run on the infected machine, this spyware starts its harmful activities, which are a potent threat for the computer's stability and performance. The following files were created in the system:

Ubuster Trojan

Posted: March 28, 2006 | Category: Trojans
Ubuster is a dangerous spyware, which usually tries to sneak silently into the machine from many Internet resources, such as suspicious web pages or newsgroups. If no actions against Ubuster are taken immediately, several critical computer components might be damaged. This always leads to computer instability, that's why removing this spyware from the infected machine as soon as possible would be the best choice. The following files were created in the system:

Ultor Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous malware, which was created in 2004, is a tremendously dangerous hacking tool, able to produce a great destruction onto the infected machine. With the help of Ultor Trojan, the anonymous hacker gets almost total control over the computer and performs such actions, like stealing confidential information and damaging many critical computer components. The following files were created in the system:

Uncapper

Posted: March 28, 2006 | Category: Trojans
This spyware usually pretends being a patch 4 for Cable/Speed. Instead of performing useful activities, this application starts harvesting for specific pieces of data and sends all information found to the specified address. This technique can always damage the user's privacy, that's why removing Uncapper as soon as possible would be a good decision. The following files were created in the system:

Untracer Trojan

Posted: March 28, 2006 | Category: Trojans
If no actions against this spyware are taken soon after getting infected, Untrace Trojan will definitely become a reason of many computer troubles, such as instability or slowdown. It's strongly recommended to get rid of this pest as soon as possible. The following files were created in the system:

Uploader Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous backdoor trojan is always able to produce a lot of problems for those users, who have no good security installed on their PCs. Uploader Trojan simply gives the hacker an opportunity to upload many spywares into the victim's PC. These spywares may produce a lot of destructive actins, which often result in different unwanted consequences . The following files were created in the system:

User32

Posted: March 28, 2006 | Category: Trojans
This dangerous spyware was designed with one specific aim of stealing user's ICQ login information. After such information is stolen, User32 trojan sends it to the anonymous hacker, which then uses it for his or her specific purposes. The following files were created in the system:

UrlKiller Trojan

Posted: March 28, 2006 | Category: Trojans
UrlKiller Trojan usually performs many actions of a low-level destruction, such as changing Internet settings and causing web browsers work in improper way. If no actions against this spyware are taken immediately, several serious problems may occur. The following files were created in the system:

Vanilla Trojan

Posted: March 28, 2006 | Category: Trojans
Although Vanilla Trojan is quite simple and easily recognisable by many antiviral computers, it still may become a reason of many difficulties for those users, who have no good defence installed on their PCs. Vanilla Trojan is always able to jeopardise the user's security and his or her computer's stability, that's why removing this pest as soon as possible would be a good decision. The following files were created in the system:

Bored Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware, which was written in Visual Basic Script, is another threat for every user, who has no reliable defence installed on his or her machine. Bored Trojan can damage different critical computer components and lead to many unwanted effects, such as computer instability and the loss of important data. The following files were created in the system:

Davin Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware is another member of a wide family of VBS-spywares. Davin Trojan usually sneaks into the target computer from many Internet resources . Once run on a PC, this pest starts performing its activities, which may seriously damage the stability and the security of the infected computer. The following files were created in the system:

Destroyer Trojan

Posted: March 28, 2006 | Category: Trojans
Destroyer Trojan is a member of the VBS-trojan family and is an extremely dangerous parasite. Once Destroyer Trojan has infiltrated your computer via security exploits and backdoors, it will proceed to damage the security and stability of the infected system. Destroyer Trojan is designed to delete various system files, some of which may be critical to the operation of your PC, and causing the infected machine to work improperly. The following files were created in the system:

Eraser Trojan

Posted: March 28, 2006 | Category: Trojans
Eraser Trojan is a dangerous spyware, which was written in Visual Basic Script. This pest is aimed on deleting user's files , that's why it's strongly recommended to keep your antiviral software up-to-date in order to prevent your PC from getting infected with Eraser Trojan. The following files were created in the system:

Golden Trojan

Posted: March 28, 2006 | Category: Trojans
As a trojan, which was written in Visual Basic Script, Golden Trojan usually infects a computer as a macro from Microsoft Office softwares . It's always dangerous to have your PC infected with spywares of this type, that's why it's strongly recommended to treat documents, which contain macros, carefully. The following files were created in the system:

Harvest Trojan

Posted: March 28, 2006 | Category: Trojans
Harvest Trojan is a dangerous spyware, which usually infects the target computer as a macro part of the MS Office document. When a careless user starts this macro, this trojan activates itself and starts performing its destructive activities, which are always a threat for the stability and the performance of the infected computer. The following files were created in the system:

IO Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware, which was written in PHP language, doesn't infect those computers, which have no PHP interpreters installed. This pest usually acts by overwriting the AUTOEXEC.BAT with its code and creates several backup copies. What is more, IO Trojan corrupts other PHP scripts and makes them unusable. This is a dangerous technique, that's why it's strongly recommended to have good antiviral software installed on your PC in order to protect it from getting infected with IO Trojan....

OUA_Exploit Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous spyware, which was written in Java Script language, is a potent threat for every computer because of its brutal activities. OUA_Exploit Trojan usually infects the computer as a part of HTML-code from suspicious web pages. What is more, this spyware has a rare feature of mailing itself to many addresses; this technique makes it similar to dangerous worms. It's always recommended to have your computer protected from this trojan by having a good security computer installed on it....

VBS.Over

Posted: March 28, 2006 | Category: Trojans
This malicious software usually infects the computer as a part of HTML-file. If this script is run on a PC, it starts searching for several computer files and overwrites them. This technique is really dangerous, because the loss of these files always results in computer instability and other unwanted effects. The following files were created in the system: