Recent Posts |
|
Free Scanners |
|
How to Prevent Spyware |
Spyware and other unwanted software can invade your privacy, bombard you with
pop-up windows, slow down your computer, and even make your computer crash. Here
are several ways you can help protect your computer against spyware and other
unwanted software.
more >> |
Microsoft Security Updates |
As part of Microsoft's routine, monthly security update cycle, today we
released two new security updates.
more >> |
Protecting Your Computer |
Here are 4 basic steps to protect your computer against attacks and threats.
more >> |
Minimizing the Risk
|
Using Internet communication tools such as chat rooms, e-mail, and instant
messaging can put children at potential risk of encountering online predators.
more>> |
|
|
Monday, February 18, 2008 |
TROJ_DELF.DAC can disable DCOM protocol on infected users and modifies registry entries.
Type: Trojan
Type Description: Trojan horse program is not capable of automatically spreading itself to other systems. Trojans are usually downloaded from the Internet whether intentionally or by software vulnerabilities.
Symptoms: User access difficulty
How to Remove TROJ_DELF.DAC: Please use the Typical Threat Removal. Click here |
posted by hitech-leiza @ Monday, February 18, 2008 |
|
|
|
|
HTML_IFRAME.AH is a detection for malicious HyperText Markup Language (HTML) for Web pages that are compromised through the insertion of a certain IFRAME tag. It may be hosted on a Web site and run when a user accesses the said Web site.
Type: Trojan
Type Description: Trojan horse program is not capable of automatically spreading itself to other systems. Trojans are usually downloaded from the Internet whether intentionally or by software vulnerabilities.
Symptoms: -
How to Remove HTML_IFRAME.AH: Please use the Typical Threat Removal. Click here |
posted by hitech-leiza @ Monday, February 18, 2008 |
|
|
|
|
TROJ_QHOST.GM is a detection for trojan that modifies Windows hosts file.
Type: Trojan
Type Description: Trojan horse program is not capable of automatically spreading itself to other systems. Trojans are usually downloaded from the Internet whether intentionally or by software vulnerabilities.
Symptoms: Reflected on Windows hosts files:
- 82.165.237.14
- 82.165.250.33
- avp.com
- ca.com
- casablanca.cz
- customer.symantec.com
- d66.myleftnut.info
- d-eu-1f.kaspersky-labs.com
How to Remove TROJ_QHOST.GM: Please use the Typical Threat Removal. Click here |
posted by hitech-leiza @ Monday, February 18, 2008 |
|
|
|
|
TROJ_DLOADER.JAR is a downloader trojan that drops and execute other malware on the already infected computer.
Type: Trojan
Type Description: Trojan horse program is not capable of automatically spreading itself to other systems. Trojans are usually downloaded from the Internet whether intentionally or by software vulnerabilities.
Symptoms: Website is being redirected. Unable to access websites.
How to Remove TROJ_DLOADER.JAR: Please use the Typical Threat Removal. Click here |
posted by hitech-leiza @ Monday, February 18, 2008 |
|
|
|
|
TROJ_VUNDO.ADP is a trojan horse that can download and install malware from a remote website.
Type: Trojan
Type Description: Trojan horse program is not capable of automatically spreading itself to other systems. Trojans are usually downloaded from the Internet whether intentionally or by software vulnerabilities.
Symptoms: -
How to Remove TROJ_VUNDO.ADP: Please use the Typical Threat Removal. Click here |
posted by hitech-leiza @ Monday, February 18, 2008 |
|
|
|
|
WORM_NUWAR.AR spreads by sending email messages with malicious attachments.
Type: Worm
Type Description: A worm can spread across networks and shared drives and folders. It is known to propagate using one or several of different transmission vectors like email, IRC, network shares, instant messengers and peer-to-peer networks.
Symptoms: Redirects website
How to Remove WORM_NUWAR.AR: Please use the Typical Threat Removal. Click here |
posted by hitech-leiza @ Monday, February 18, 2008 |
|
|
|
|
EXPL_PIDIEF.O a detection for an exploit code that takes advantage of multiple vulnerabilities in versions of Adobe Reader earlier than 8.1.2. For more information on the said vulnerabilities.
Type: Worm
Type Description: A worm can spread across networks and shared drives and folders. It is known to propagate using one or several of different transmission vectors like email, IRC, network shares, instant messengers and peer-to-peer networks.
Symptoms: Unwanted connection to unknown websites
How to Remove EXPL_PIDIEF.O: Please use the Typical Threat Removal. Click here |
posted by hitech-leiza @ Monday, February 18, 2008 |
|
|
|
|
JS_REALEXPLOIT.A takes advantage of a known vulnerability in several versions of the media player RealPlayer that causes a stack overflow and allows the download of possibly malicious files on the affected system.
Type: Trojan
Type Description: Trojan horse program is not capable of automatically spreading itself to other systems. Trojans are usually downloaded from the Internet whether intentionally or by software vulnerabilities.
Symptoms: Presence of files:
- C:\Program Files\NetMeeting\TestSnd.wav
- C:\Windows\Media\chimes.wav
- C:\windows\system32\BuzzingBee.wav
- C:\windows\clock.avi
- C:\Windows\Media\tada.wav
- C:\windows\system32\LoopyMusic.wav
How to Remove JS_REALEXPLOIT.A: Please use the Typical Threat Removal. Click here |
posted by hitech-leiza @ Monday, February 18, 2008 |
|
|
|
|
WORM_ONLINEG.DSO can download and drop files onto the computer. It steals information related to online games.
Type: Worm
Type Description: A worm can spread across networks and shared drives and folders. It is known to propagate using one or several of different transmission vectors like email, IRC, network shares, instant messengers and peer-to-peer networks.
Symptoms: Presence of the file %System%\amvo.exe
How to Remove WORM_ONLINEG.DSO: Please use the Typical Threat Removal. Click here |
posted by hitech-leiza @ Monday, February 18, 2008 |
|
|
|
|
JS_AUTORUN.AAF is a malicious java script embedded on websites that drops malware onto the visitors computer.
Type: Trojan
Type Description: Trojan horse program is not capable of automatically spreading itself to other systems. Trojans are usually downloaded from the Internet whether intentionally or by software vulnerabilities.
Symptoms: Presence of file %System%\VirusMawar.js
How to Remove JS_AUTORUN.AAF: Please use the Typical Threat Removal. Click here |
posted by hitech-leiza @ Monday, February 18, 2008 |
|
|
|
|
TROJ_DLOADER.EUZ is a downloader trojan that can dropped additional malware on the already infected computer.
Type: Trojan
Type Description: Trojan horse program is not capable of automatically spreading itself to other systems. Trojans are usually downloaded from the Internet whether intentionally or by software vulnerabilities.
Symptoms: Website is being redirected. Unable to access websites.
How to Remove TROJ_DLOADER.EUZ: Please use the Typical Threat Removal. Click here |
posted by hitech-leiza @ Monday, February 18, 2008 |
|
|
|
|
WORM_IRCBOT.SN can spread with network shares or can be dropped with another malware.
Type: Worm
Type Description: A worm can spread across networks and shared drives and folders. It is known to propagate using one or several of different transmission vectors like email, IRC, network shares, instant messengers and peer-to-peer networks.
Symptoms: IRC automatically sends messages: • Hey this is a pic of my new camara check it out • hey do you mind if I add this picture of us to my album? • is it ok if I add this picture of us to my eblog? • this is a new pic of me accept it ;] • This look good enough for my default? • How do we look together? • Damn I think this looks goood! • Picture editing sure is hard. Take a look! • This can't be you.... right? • OMFG, Look at this insanity!
How to Remove WORM_IRCBOT.SN: Please use the Typical Threat Removal. Click here |
posted by hitech-leiza @ Monday, February 18, 2008 |
|
|
|
|
WORM_AGENT.TBH can be obtain by visiting websites with malicious scripts.
Type: Worm
Type Description: A worm can spread across networks and shared drives and folders. It is known to propagate using one or several of different transmission vectors like email, IRC, network shares, instant messengers and peer-to-peer networks.
Symptoms: Presence of the file %Program Files%\meex.exe
How to Remove WORM_AGENT.TBH: Please use the Typical Threat Removal. Click here |
posted by hitech-leiza @ Monday, February 18, 2008 |
|
|
|
|
SYMBOS_BESELO.A is Symbian malware infects mobile devices running Symbian OS/S60 2nd Edition.
Type: Worm
Type Description: A worm can spread across networks and shared drives and folders. It is known to propagate using one or several of different transmission vectors like email, IRC, network shares, instant messengers and peer-to-peer networks.
Symptoms: Send messages with the following attached: - beauty.jpg - love.rm - sex.mp3
How to Remove SYMBOS_BESELO.A: Please use the Typical Threat Removal. Click here |
posted by hitech-leiza @ Monday, February 18, 2008 |
|
|
|
Sunday, February 03, 2008 |
WORM_VB.BWZ is a worm that can disable Windows funtions and can be downloaded without users intervention.
Type: Worm
Type Description: A worm can spread across networks and shared drives and folders. It is known to propagate using one or several of different transmission vectors like email, IRC, network shares, instant messengers and peer-to-peer networks.
Symptoms: Presence of the file %Windows%\SYSTEMIL.EXE
How to Remove WORM_VB.BWZ: Please use the Typical Threat Removal. Click here |
posted by hitech-leiza @ Sunday, February 03, 2008 |
|
|
|
Free Stuff |
|
Ads |
Sidebar
|
Archives |
|
Powered by |
|
|