Angelfire

Posted: March 28, 2006 | Category: Trojans
If no actions against this spyware are taken soon after getting infected, it may become a reason of many negative effects on the infected PC. These effects usually vary from several annoying actions to really dangerous one, such as the loss of confidential data. The following files were created in the system:

AntiPC Trojan

Posted: March 28, 2006 | Category: Trojans
AntiPC Trojan is a really dangerous backdoor, which can become a very dangerous threat for the infected computer. This pest gives the anonymous hacker an access to the PC and provides him or her with an ability of performing many destructive actions. These actions can always jeopardise the user's privacy, that's why it's strongly advisable to get rid of this spyware as soon as possible. The following files were created in the system:

AVone Trojan

Posted: March 28, 2006 | Category: Trojans
AVone Trojan is a dangerous spyware, which is always able to become a real threat for those computers, which have no good defence installed. This pest acts by providing the hacker with a partial control over infected computer and, as a result of this, with ability of stealing many pieces of confidential data. This is always a threat for the user's privacy and security, that's why getting rid of this trojan as soon as possible would be a really wise choice. The following files were...

BAT.Comlabat

Posted: March 28, 2006 | Category: Trojans
BAT.Comlabat acts in a bit different way than the majority of such infectors do. This particular spyware is able perform several actions, which are common for backdoor trojans. For example, this spyware can mine for specific data and write it into special log-files, which are always available for the hacker. The following files were created in the system:

Bancodor Trojan

Posted: March 28, 2006 | Category: Trojans
The computer can get infected with many variations of this spyware, that's why there's never a guarantee that your antiviral computer will definitely detect and remove this pest. If Bancodor Trojan infects the machine, it starts performing many destructive actions, which can often result in the loss of confidential information and other sad consequences. The following files were created in the system:

BaronNight Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware is a really dangerous trojan, because it always compromises the user's privacy and his or her PC's security. By performing its special set of actions, this pest gives a partial control over the machine to the anonymous hacker. Once that has happened, the hacker can perform many activities on the infected computer, such as tealing user's account passwords, making the whole computer work in improper way, etc. The following files were created in the system:

Basic Hell

Posted: March 28, 2006 | Category: Trojans
Basic Hell is a parasitic backdoor trojan with an ability of providing its owner with a partial control over the infected computer. This technique, which is common for almost all backdoors, is still a great threat for the user, because his or her privacy is strongly compromised by this pest's actions. The following files were created in the system:

Syphillis Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious application is a backdoor, which usually acts by infecting the ICQ client on the infected PC and trying to connect with the hacker via this messenger. In case of success the hacker gets a partial access to the computer and an ability of performing many actions, such as stealing user's passwords. The following files were created in the system:

NokNok Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious application, which was written in Lithuania, is a backdoor trojan. With the help of this destructive utility the hacker can break into the target machine and start performing his or her harmful activities, such as damaging computer components, uploading/downloading files, stealing private information, etc. The following files were created in the system:

Foreplay Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous spyware is a trojan, which usually infects the computer from many suspicious Internet resources or e-mail messages from unknown senders. Foreplay Trojan performs a set of destructive actions , which often result in different unwanted consequences, that's why it's recommended to get rid of this spyware as soon as possible. The following files were created in the system:

Arctic Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious spyware is a backdoor trojan, which usually acts by infecting the computer as an attachment from many e-mail messages and giving the anonymous hacker a remote control over infected machine. This technique is really dangerous for everyone, because the hacker is able to steal user's passwords, messages and other confidential information. The following files were created in the system:

Muska Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware is a really multifunctional backdoor trojan, which was designed for many needs of the hacker. For example, this pest can easily steal user's ICQ or AIM passwords. What is more, the hacker can get access to the infected machine and starts performing his or her harmful activities freely. The following files were created in the system:

Skun

Posted: March 28, 2006 | Category: Trojans
Skun is a backdoor Trojan that is quite old and can't keep up with modern threats, which comes packed with loads of features that allow attackers to execute all kinds of threatening operations on their victim's computers. However, this does not mean that Skun is not used to day necessarily, and it is highly likely that some users who still use Internet Relay Chat (IRC) clients may come across this threatening piece of software. The Skun backdoor Trojan may be still distributed via...

BladeRunner Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous spyware was designed with one specific aim of giving the anonymous hacker a partial control over the infected machine. With the help of this destructive utility hacker can modify many computer settings, upload different files, steal user's confidential information, etc. It's always advisable to get rid of this pest as soon as possible. The following files were created in the system:

Pinochet Trojan

Posted: March 28, 2006 | Category: Trojans
Pinochet Trojan is a very dangerous spyware, which is always able to jeopardise privacy and security of every user, who has no reliable defence installed on his or her PC. This pest usually acts by logging user's keystrokes and sending mined data to the anonymous address. This method often results in the loss of many important messages or passwords. The following files were created in the system:

Ramen Trojan

Posted: March 28, 2006 | Category: Trojans
Ramen Trojan is a deadly combination of worm, trojan and other spywares. Every PC, which is infected with this pest, is in great danger of losing its stability and a part of performance. It's always strongly recommended not to open any files you don't know in order to protect your PC from getting infected with this trojan. The following files were created in the system:

TheFlu

Posted: March 28, 2006 | Category: Trojans
This malicious application is a trojan, which doesn't strive to infect as many PCs as possible but concentrates on damaging one particular PC. Every machine, infected with TheFlu is in danger of having its important information lost. The loss of several key files can often result in different unwanted consequences; that's why it's strongly recommended to get rid of this pest as soon as possible. The following files were created in the system:

Bmail Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious application is a backdoor trojan, which usually infects the computer and gives the anonymous hacker a remote access to it. This results in many destructive actions, such as the loss of user's passwords and confidential messages. The following files were created in the system:

007 Shell

Posted: March 28, 2006 | Category: Trojans
This software can be used for many purposes, such as bypassing firewalls and other similar security computers. What is more, this application can be used by hackers for creating some kind of a tunnel between several machines and performing many actions, which can result in several problems for the user of the infected PC. The following files were created in the system:

17th.Inst

Posted: March 28, 2006 | Category: Trojans
This spyware is a specific representative of many macro-trojans. 17th.Inst usually sneaks into the computer from many Internet resources as a part of THML code or even *.doc file. Once run on the target PC, this pest starts performing its activities, which lead to computer instability and the loss of data. The following files were created in the system: