Warpcom Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious application is a trojan, which is always able to damage the computer, if there's no reliable security installed on it. Warpcom Trojan acts by infecting many files ; the loss of these files can often result in different unwanted consequences, such as computer crashes or slowdown. The following files were created in the system:

Waster Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous spyware was designed for giving the anonymous hacker a partial control over the infected machine. The hacker gets an ability of stealing many pieces of private data or damaging critical computer components. The following files were created in the system:

WindowBomb Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious spyware is a trojan, which isn't as harmful as annoying. WindowBomb Trojan acts by opening a large number of browser windows and disabling the mouse pointer . As follows from everything written above, it would be a good decision to get rid of this pest as soon as possible. The following files were created in the system:

WatcHeador Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious spyware is a trojan, which usually sneaks silently into a target computer from many Internet resources, such as suspicious web pages or chats. WatcHeador usually acts by damaging critical computer components and causing many unwanted effects . The following files were created in the system:

Watching Trojan

Posted: March 28, 2006 | Category: Trojans
Watching Trojan is a dangerous spyware, which can always become a reason of many computer troubles . By using its simple, but really effective algorithms, this spyware searches for different key files and overwrites them. It's strongly recommended to detect and remove this pest from the infected machine as soon as possible. The following files were created in the system:

WbeCheck Trojan

Posted: March 28, 2006 | Category: Trojans
Watching Trojan is an extremely dangerous spyware, which is always able to provide the anonymous hacker with a partial control over the infected machine. The hacker gets an ability to perform many actions, which may vary from annoying jokes to destructive actions, which often compromise the user's security and privacy. The following files were created in the system:

Web Cache Trojan

Posted: March 28, 2006 | Category: Trojans
Web Cache Trojan is a potent threat for every user, who has no good defence installed on his or her PC. This spyware gives the hacker an access to the remote PC; the hacker is able to perform many destructive actions, such as stealing passwords or damaging file computer. The following files were created in the system:

Whale Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous trojan usually uses its difficult and really effective algorithm for searching for many files and infecting them. Files, which are in danger, have following extensions: *.OVL, *.COM and *.EXE. These files get infected right after the user opens or closes them. It's clear from everything written above, that this spyware is tremendously dangerous and should be removed from the infected machine as soon as possible. The following files were created in the system:

WIC Trojan

Posted: March 28, 2006 | Category: Trojans
WIC Trojan is a dangerous spyware, which is a potent threat for those users, who have no reliable security installed on their PCs. This spyware acts by damaging critical computer components and causing the infected machine work in improper way. The following files were created in the system:

WinSatan Trojan

Posted: March 28, 2006 | Category: Trojans
WinSatan Trojan is a dangerous backdoor, which always compromises the user's security and privacy. This spyware provides the anonymous hacker with a remote control over the infected machine; the hacker can modify many computer settings or simply steal confidential data . The following files were created in the system:

WinZapper Trojan

Posted: March 28, 2006 | Category: Trojans
Winzapper Trojan is a Trojan horse that infects your PC through dishonest means before Winzapper Trojan makes a variety of attacks on the system. Despite its name, SpywareRemove.com malware researchers haven't found any links between the Winzapper Trojan and the hacker tool Winzapper, which confines its functions to selective deletion of security log events from Windows 2000, NT and 2003 operating systems. Although Winzapper Trojan was first confirmed as a PC threat in 2004, Winzapper Trojan...

Crosser Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous trojan is a spyware, which is always able to compromise the privacy of any user, who has no reliable defence installed on his or her PC. Crosser Trojan can damage many critical computer files as well as steal user's passwords or other confidential information. The following files were created in the system:

Gollum Trojan

Posted: March 28, 2006 | Category: Trojans
Although this spyware is quite old, its versatility and destructive actions make it a potent threat for every unprotected computer. Gollum Trojan is able to damage Windows or DOS platforms in different ways. This spyware may infect DOS files or Windows memory. Both techniques are tremendously dangerous, because every *.EXE file found is automatically infected with this pest. There's no need to say that these actions are a real threat for the computer stability, that's why it's strongly...

HaveFun Trojan

Posted: March 28, 2006 | Category: Trojans
This Trojan Horse isn't usually able to produce a lot of fun for the user of the infected machine. Instead of this, HaveFun Trojan performs many destructive actions, which may often seriously damage computer stability and security. It's strongly recommended to detect and remove this spyware from the infected PC as soon as possible. The following files were created in the system:

HookDump Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous spyware is able to damage the user's security and privacy in many ways. For example, the HookDump Trojan is able to log keystrokes and write everything in one file. If the hacker gets this file, a great damage to the user's privacy will be done. What is more, this Trojan Horse is able to modify many computer settings and make the whole computer work in unstable way. The following files were created in the system:

StalkerX Trojan

Posted: March 28, 2006 | Category: Trojans
StalkerX is a specific trojan, which usually damages the computer by generating a brand new file infector and installing this new spyware onto the computer. It is common for such infectors to infect EXE-files with a copy of itself. If no actions against StalkerX are taken immediately after getting infected, a lot of damage can be made. The following files were created in the system:

Akuan Trojan

Posted: March 28, 2006 | Category: Trojans
Akuan Trojan is a dangerous spyware, which is always able to jeopardise the user's privacy and security. This Trojan Horse usually acts by hitting important computer components; the loss of these components always result in computer instability, often crashes or dramatic slowdown. The following files were created in the system:

Aris Trojan

Posted: March 28, 2006 | Category: Trojans
Aris Trojan is a combination of trojan with nuke, that's why it's tremendously dangerous for every computer with no proper defence installed on it. This spyware usually acts by deleting or changing different critical computer files; the loss of these files usually leads to computer instability and is even able to paralyse the machine. The following files were created in the system:

Bingo Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware is absolutely harmless and able only to perform annoying actions. Bingo Trojan periodically shows a window with an image of a ghost; in parallel with that this pest tries to open the CD-ROM of the infected PC. The following files were created in the system:

CleanLogs Trojan

Posted: March 28, 2006 | Category: Trojans
Although CleanLogs Trojan isn't really dangerous and performs actions, which can only annoy users, it's still strongly recommended to get rid of this spyware as soon as possible. This trojan is able to modify many settings of the Internet browser and, sometimes, try to connect to different web sites. The following files were created in the system: