1. Tech

Articles related to trojans

Trojan - What Is a Trojan - Antivirus - About.com
Many of the the earlier Trojans were used to launch distributed denial-of-service ( DDoS) attacks, such as those suffered by Yahoo and eBay in the latter part of ...
http://antivirus.about.com/od/whatisavirus/g/trojan.htm
Malware - Understand and Avoid Viruses, Trojans, and Other ...
Malware is short for "malicious software" and is an umbrella term used to refer to viruses, worms, Trojans, spyware, adware, and other forms of malicious code.
http://antivirus.about.com/od/whatisavirus/u/malware.htm
What Is a Keylogger Trojan? - Computer Viruses
Keyloggers and other forms of remote-access trojans tend to be the most determined malware, taking extra steps to stealth its presence, including through the ...
http://antivirus.about.com/od/whatisavirus/a/keylogger.htm
Trojans and Viruses in Computer Networking - About.com
A trojan is a network software application designed to remain hidden, like a virus. Unlike viruses, trojans can steal personal information from home or business ...
http://compnetworking.about.com/cs/worldwideweb/g/bldef_trojan.htm
How To Scan Your Computer for Viruses & Other Malware
How To Properly Scan Your Computer for Viruses, Trojans, and Other Malware. By Tim Fisher · PC Support Expert. Share this. Photo of a virus indication key on ...
http://pcsupport.about.com/od/fixtheproblem/ht/virus-scan-malware-scan.htm
Winthb virus tied to backdoor trojans - Antivirus - About.com
A family of backdoor and autorun trojans are working together to plague users. One symptom that may appear - the drive volume name and icon may be ...
http://antivirus.about.com/od/virusdescriptions/a/winthbvirus.htm
MMORPG Trojans Abound - Antivirus - About.com
Trojans used to create botnets have long been implicated in spam and credit card fraud rings. But online games, particulary MMORPGs (Massive Multi-player  ...
http://antivirus.about.com/od/emailscams/a/mmorpg_hacks.htm
Is your PC a zombie? - Antivirus - About.com
Trojans have the same right on the system as does the logged in user. In other words, if the user can, the Trojan can. This includes deleting or modifying files, ...
http://antivirus.about.com/od/whatisavirus/a/zombiepc.htm
What's a Trojan Horse virus? - Antivirus - About.com
May 31, 2006 ... There are several different types of Trojans. Some of these include: remote access Trojans (RATs), backdoor Trojans (backdoors), IRC Trojans ...
http://antivirus.about.com/b/2006/05/31/whats-a-trojan-horse-virus.htm
News Briefs: Hackers and Custom Trojans - Antivirus - About.com
GFI white paper exposes how hackers can elude anti- virus software with custom Trojans.
http://antivirus.about.com/library/news/bl070903_1.htm
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10      Next

©2015 About.com. All rights reserved.