Geschenk

Posted: March 28, 2006 | Category: Trojans
This spyware is nothing more than a simple and absolutely harmless joke. Geschenk has only one action available to it - opening CD-ROM. As it is clear from written above, this technique doesn't mean any serious danger, but can be annoying; that's why it's recommended to get rid of this pest as soon as possible. The following files were created in the system:

Giggle Trojan

Posted: March 28, 2006 | Category: Trojans
This pest is a parasitic trojan, which usually acts by trying to sneak silently into the target PC and start performing its destructive activities. Although these activities, which include showing annoying messages and deleting specific files, aren't really harmful, it's still strongly recommended to detect and remove Giggle Trojan from the infected machine as soon as possible. The following files were created in the system:

Gip Trojan

Posted: March 28, 2006 | Category: Trojans
Gip Trojan is a malicious spyware, which specializes in stealing many passwords. This can be easily completed with the help of this pest's specific key logging technique. What is more, Gip Trojan can also download spywares from the Internet and infect the target PC with them; this method makes it really dangerous to be infected with Gip Trojan, that's why removing it as soon as possible would be the best decision. The following files were created in the system:

Giri

Posted: March 28, 2006 | Category: Trojans
Giri is a malicious and really annoying trojan, which usually infects the computer from suspicious e-mail messages or many web sites. Once the infected file is run on a PC, it starts performing several registry changes and makes it possible to start one of four annoying actions three months after getting infected. These payloads include opening CD-ROM, changing desktop wallpapers, killing running softwares and disabling mouse. The following files were created in the system:

GirlBoy Trojan

Posted: March 28, 2006 | Category: Trojans
GirlBoy is a dangerous backdoor trojan, which usually provides the hacker with a possibility of performing many destructive actions. These actions can help him or her to steal user's confidential information , change computer settings, upload different viruses, etc. The following files were created in the system:

Glacier Trojan

Posted: March 28, 2006 | Category: Trojans
This pest is a typical backdoor trojan, which gives the hacker a partial control over infected PC. The hacker is able to perform a set of destructive actions, such as uploading other viruses, changing computer settings or stealing confidential data and using it for his or her specific purposes. The following files were created in the system:

Gnotify Trojan

Posted: March 28, 2006 | Category: Trojans
Gnotify is a malicious backdoor trojan, which usually infects the target computer through ICQ network. Once this had happened, the anonymous hacker gets a remote access to the infected PC and can start performing different destructive actions, such as uploading viruses, damaging critical computer components or stealing passwords. The following files were created in the system:

Goblin Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious spyware is a destructive trojan, which usually sneaks into the computer from many Internet resources, such as peer-to-peer networks or chats. The main aim of Goblin Trojan is performing destruction; this can be achieved by deleting critical files, changing computer settings, modifying key computer components, etc. In the result of this infection infected computer can start working improperly or even become totally unusable. The following files were created in the system:

God Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious backdoor trojan is an extremely dangerous spyware, which uses several known IE vulnerabilities for sneaking into PCs and infecting them. If this happens, this pest can easily start its destructive activities, such as stealing passwords or infecting target machine with other spywares. The following files were created in the system:

GodWill

Posted: March 28, 2006 | Category: Trojans
GodWill is a tremendously dangerous and destructive trojan, which is able to damage the infected computer in many ways. First of all, GodWill can connect to the specified server and start downloading spywares from it; this technique results in even greater destruction. What is more, this specific pest can provide the anonymous hacker with a partial control over infected PC and, as a result of this, with the ability of stealing confidential data . The following files were created in...

Goga Trojan

Posted: March 28, 2006 | Category: Trojans
Goga Trojan is a specific backdoor trojan, which uses a very rare technique of infecting the computer from RTF-files. Many users consider these files to be absolutely harmless and open them freely. Once this pest infects the computer, it tries to steal user's passwords for Internet access and send this information to the hacker. The following files were created in the system:

Gop Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious spyware is a password stealer, which specializes in getting OICQ passwords. Gop Trojan acts by logging user's keystrokes when he or she enters login information. Once than happens, this pest sends log file to the hacker, who becomes able to use this information for his or her specific purposes. The following files were created in the system:

Goster Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous backdoor trojan works through ICQ messenger. It gets commands from the anonymous hacker through this messenger and performs many destructive actions according to these instructions. These actions can vary from innocent ones, such as showing annoying messages, to those, which can cause serious computer instability or the loss of performance. The following files were created in the system:

Grab Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware is an extremely hybrid of a backdoor trojan with a nuker. This means Grab Trojan is able to damage the computer in many ways. First of all, it can provide the anonymous hacker with a partial control over infected machine; this makes hacker able to steal passwords, change computer settings and upload other files. Secondly, this pest can damage the infected PC by itself; this usually happens after Grab Trojan removes critical files and makes the computer unusable. The...

Grador Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious pest is a backdoor trojan, which sends mined information from the infected PC to the hacker. This information can often include private pieces of data, such as passwords or logins, that's why it's strongly recommended to keep your antiviral software updated in order to prevent this pest from sneaking into your machine. The following files were created in the system:

Gribble

Posted: March 28, 2006 | Category: Trojans
This malicious spyware usually sneaks into the computer through one known security hole of Internet Explorer. If this happens, Gribble drops several trojans onto infected computers and tries to perform a DoS attack on some certain servers. The following files were created in the system:

Gunsan Trojan

Posted: March 28, 2006 | Category: Trojans
Gunsan Trojan is a really dangerous and multifunctional spyware, which can damage the infected computer in many ways. This pest can infect the PC from many suspicious Internet resources, IRC network or many peer-to-peer computers. Gunsan acts by disabling antiviral protection, corrupting critical files, changing registry entries and even performing DoS attacks. The following files were created in the system:

HakTek Trojan

Posted: March 28, 2006 | Category: Trojans
HakTek is a versatile trojan, which is able to damage infected computer in many ways. Firs of all, this pest is a backdoor, created for giving anonymous hacker a remote control over infected computer. This technique makes the hacker able to steal confidential data or change computer settings. What is more, HakTek can also be used as a DoS attack tool; these attacks usually use infected PCs for simultaneous connection to servers in order to disable them. The following files were...

Hard Drive Filler

Posted: March 28, 2006 | Category: Trojans
Hard Drive Filler is a malicious and very annoying spyware, which specializes in filling hard drive with many junk files. This makes infected computer unstable and really slow, that's why it's strongly recommended to get rid of this pest as soon as possible. The following files were created in the system:

Harvester

Posted: March 28, 2006 | Category: Trojans
Harvester is a specific trojan, which is really dangerous for gamers. This pest acts by scanning infected PC for games' CD-keys. If such data is found, harvester writes it into a log file and sends it to the hacker. This anonymous hacker is then able to use these keys for his or her specific needs. The following files were created in the system: