1. Tech

Articles related to trojans

Trojan - What Is a Trojan - Antivirus - About.com
Many of the the earlier Trojans were used to launch distributed denial-of-service ( DDoS) attacks, such as those suffered by Yahoo and eBay in the latter part of ...
Malware - Understand and Avoid Viruses, Trojans, and Other ...
Malware is short for "malicious software" and is an umbrella term used to refer to viruses, worms, Trojans, spyware, adware, and other forms of malicious code.
What Is a Keylogger Trojan? - Computer Viruses
Keyloggers and other forms of remote-access trojans tend to be the most determined malware, taking extra steps to stealth its presence, including through the ...
Trojans and Viruses in Computer Networking - About.com
A trojan is a network software application designed to remain hidden, like a virus. Unlike viruses, trojans can steal personal information from home or business ...
How To Scan Your Computer for Viruses & Other Malware
How To Properly Scan Your Computer for Viruses, Trojans, and Other Malware. By Tim Fisher · PC Support Expert. Share this. Photo of a virus indication key on ...
Winthb virus tied to backdoor trojans - Antivirus - About.com
A family of backdoor and autorun trojans are working together to plague users. One symptom that may appear - the drive volume name and icon may be ...
MMORPG Trojans Abound - Antivirus - About.com
Trojans used to create botnets have long been implicated in spam and credit card fraud rings. But online games, particulary MMORPGs (Massive Multi-player  ...
Is your PC a zombie? - Antivirus - About.com
Trojans have the same right on the system as does the logged in user. In other words, if the user can, the Trojan can. This includes deleting or modifying files, ...
What's a Trojan Horse virus? - Antivirus - About.com
May 31, 2006 ... There are several different types of Trojans. Some of these include: remote access Trojans (RATs), backdoor Trojans (backdoors), IRC Trojans ...
News Briefs: Hackers and Custom Trojans - Antivirus - About.com
GFI white paper exposes how hackers can elude anti- virus software with custom Trojans.
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10      Next

©2015 About.com. All rights reserved.