3DStars Trojan

Posted: March 28, 2006 | Category: Trojans
There are a wide variety of harmful actions available to this spyware, that's why it should always be treated carefully. 3DStars acts by establishing a connection between the infected machine and the hacker’s PC. This technique makes it possible for the hacker to perform many actions on the infected PC. The following files were created in the system:

3Trojans

Posted: March 28, 2006 | Category: Trojans
This old joke-trojan, which was written in Quick Basic, doesn't carry any harmful actions. This spyware is only able to produce several annoying actions, such as showing many messages or making printer work improperly. Even though it's quite harmless, it still would be a wise decision to get rid of this spyware as soon as possible. The following files were created in the system:

SevenEleven Trojan

Posted: March 28, 2006 | Category: Trojans
SevenEleven trojan has a wide variety of actions available to it, and every one of these actions can cause dangerous consequences. For example, this pest has backdoor features; this means it connects to the Internet and gives the access to the infected PC to the anonymous hacker, who is able to perform many destructive activities. What is more, this trojan is also able to damage antiviral software installed on a target PC. This technique makes it easier for other spywares to sneak into this...

7Sphere Ttrojan

Posted: March 28, 2006 | Category: Trojans
This spyware is a trojan, which is always able to damage the infected PC greatly. With the help of 7Sphere Trojan the hacker can easily get the control over machine and start performing malicious actions on it. What is more, the infected computer can be used as a DoS attack tool. This technique doesn't mean the infected PC is in great danger, but still it is strongly recommended to get rid of this pest as soon as possible. The following files were created in the system:

BAT.911

Posted: March 28, 2006 | Category: Trojans
This spyware is a dangerous batch-file infector, which sneaks into the PC and starts infecting its BAT-files with a copy of itself. This is a dangerous technique, because different key BAT-files are in danger of getting infected. The loss of original content of such files can lead to many unwanted effects, such as computer instability. The following files were created in the system:

ABX Trojan

Posted: March 28, 2006 | Category: Trojans
This specific backdoor trojan specializes in searching for the IRC client on the infected PC and, in case of success, infecting it and giving a control over it to the anonymous hacker. A wide variety of actions is available to the hacker: he or she is able to steal user's private IRC messages, passwords, files, etc. It's always recommended to keep your antiviral software up-to-date in order to stay protected from such dangerous spywares as ABX Trojan. The following files were...

AcidReign Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware, which was written in Java Script, is a tremendously dangerous backdoor. AcidReign Trojan usually infects the computer as a part of HTML-code from many suspicious web pages. After sneaking into the target PC, this pest starts attempting to give the control over infected PC to the anonymous hacker. In case of success, the hacker gets an access to the user's private messages and passwords. What is more, the hacker gets an ability of uploading many files onto the infected machine....

AcidKor Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware, which was written in Visual Basic 6.0, is a dangerous tool of destruction because of way it works. AcidKor Trojan gives the access to the PC to the hacker, who is then able to perform many actions. For example, this hacker can easily modify many computer settings, steal user's private data, upload files, etc. The following files were created in the system:

AckCmds

Posted: March 28, 2006 | Category: Trojans
This spyware is able to provide the anonymous hacker with a remote control over the infected PC by creating some kind of a tunnel between two PCs. This technique makes it quite easy for the hacker to perform these actions: upload/download many files, change different computer components, steal private data, etc. The following files were created in the system:

ActiveMouse Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware is a macro, which can be found in many Outlook documents. This pest can usually infect the computer as an attachment from many e-mail letters from unknown senders. In the result of this pest's activities, several annoying effects can occur. For example, the main effect is changing the behaviour of a mouse cursor, which can suddenly start acting in unpredictable way. The following files were created in the system:

Admire Trojan

Posted: March 28, 2006 | Category: Trojans
Admire Trojan is a backdoor trojan, which usually helps the hacker to perform many actions and, as a result of this, compromises the user's privacy and security. The hacker can perform a wide variety of harmful actions , which can result in different unwanted effects, that's why removing this pest from the infected machine as soon as possible would be a really wise decision. The following files were created in the system:

Advice Trojan

Posted: March 28, 2006 | Category: Trojans
Although this spyware is quite old and unable to damage many modern computers, it is still quite dangerous for those users, who have old operating computers and tools. This macro trojan requires a MS Word97 to be installed on the target PC. Advice Trojan usually performs many actions, which can't usually damage the machine strongly, but still it's strongly recommended to get rid of it as soon as possible. The following files were created in the system:

Aibolit Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous spyware, which was created by Russian hackers, is always able to damage the user's privacy and security by giving the access to his or her PC to the anonymous hacker. In the result of this procedure, the hacker becomes able to perform many actions, such as stealing user's passwords or deleting key files. The following files were created in the system:

AIM Thief

Posted: March 28, 2006 | Category: Trojans
AIM Thief is a password capturer, which specializes in infecting the IAM messenger and logging user's keystrokes. Once the user enters his login information into a special field, this pest writes it into a special log file and sends this file to the hacker. This often results in the loss of user's account with all negative consequences. The following files were created in the system:

Ajan Trojan

Posted: March 28, 2006 | Category: Trojans
Ajan Trojan is a password stealer, which uses its specific algorithms for continuous monitoring of user's actions. If an attempt of entering login information is detected, this spyware writes this information into a log file and, after some certain period of time, sends this log to the hacker. The hacker can freely use user's accounts and make them his or her property. The following files were created in the system:

Alarm Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware is nothing more than a simple joke, which attempts to scare inexperienced users by simulating some kind of an alarm. This false alarm doesn't carry any destructive payload, but still it's strongly recommended to get rid of this prank trojan as soon as possible. The following files were created in the system:

Alcarys trojan

Posted: March 28, 2006 | Category: Trojans
This malicious spyware is a multifunctional trojan, which is able to damage the infected computer in many ways. This pest usually infects the computer as a macro from many *.DOC files or simply as an attachment from different suspicious e-mail messages. Alcarys Trojan usually acts by infecting IRC client, modifying different key computer components, downloading many spywares, etc. The following files were created in the system:

Alerta Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware is a prank trojan, which can often scare inexperienced users by simulating a computer alert. The efficiency of this spyware isn't as high as it could be, because it uses the Spanish language for describing this false alert. The following files were created in the system:

Alerter Trojan

Posted: March 28, 2006 | Category: Trojans
Although this spyware's name makes it look like innocent prank trojans, like Alerta Trojan, this pest isn't as harmless and can lead to many negative effects on the infected PC. Alerter Trojan acts by providing the anonymous hacker with a remote control over PC; the hacker gets an ability of stealing user's passwords, confidential messages or simply deleting different key files. The following files were created in the system:

Algus Trojan

Posted: March 28, 2006 | Category: Trojans
Algous this spyware's main aim is stealing user's passwords, it can also perform several destructive actions , which can make computer work in unstable way. This spyware is really dangerous, that's why removing it as soon as possible is strongly recommended. The following files were created in the system: