Recent Posts |
|
Free Scanners |
|
How to Prevent Spyware |
Spyware and other unwanted software can invade your privacy, bombard you with
pop-up windows, slow down your computer, and even make your computer crash. Here
are several ways you can help protect your computer against spyware and other
unwanted software.
more >> |
Microsoft Security Updates |
As part of Microsoft's routine, monthly security update cycle, today we
released two new security updates.
more >> |
Protecting Your Computer |
Here are 4 basic steps to protect your computer against attacks and threats.
more >> |
Minimizing the Risk
|
Using Internet communication tools such as chat rooms, e-mail, and instant
messaging can put children at potential risk of encountering online predators.
more>> |
|
|
Monday, February 18, 2008 |
TROJ_DELF.DAC can disable DCOM protocol on infected users and modifies registry entries.
Type: Trojan
Type Description: Trojan horse program is not capable of automatically spreading itself to other systems. Trojans are usually downloaded from the Internet whether intentionally or by software vulnerabilities.
Symptoms: User access difficulty
How to Remove TROJ_DELF.DAC: Please use the Typical Threat Removal. Click here |
posted by hitech-leiza @ Monday, February 18, 2008 |
|
|
|
|
HTML_IFRAME.AH is a detection for malicious HyperText Markup Language (HTML) for Web pages that are compromised through the insertion of a certain IFRAME tag. It may be hosted on a Web site and run when a user accesses the said Web site.
Type: Trojan
Type Description: Trojan horse program is not capable of automatically spreading itself to other systems. Trojans are usually downloaded from the Internet whether intentionally or by software vulnerabilities.
Symptoms: -
How to Remove HTML_IFRAME.AH: Please use the Typical Threat Removal. Click here |
posted by hitech-leiza @ Monday, February 18, 2008 |
|
|
|
|
TROJ_QHOST.GM is a detection for trojan that modifies Windows hosts file.
Type: Trojan
Type Description: Trojan horse program is not capable of automatically spreading itself to other systems. Trojans are usually downloaded from the Internet whether intentionally or by software vulnerabilities.
Symptoms: Reflected on Windows hosts files:
- 82.165.237.14
- 82.165.250.33
- avp.com
- ca.com
- casablanca.cz
- customer.symantec.com
- d66.myleftnut.info
- d-eu-1f.kaspersky-labs.com
How to Remove TROJ_QHOST.GM: Please use the Typical Threat Removal. Click here |
posted by hitech-leiza @ Monday, February 18, 2008 |
|
|
|
|
TROJ_DLOADER.JAR is a downloader trojan that drops and execute other malware on the already infected computer.
Type: Trojan
Type Description: Trojan horse program is not capable of automatically spreading itself to other systems. Trojans are usually downloaded from the Internet whether intentionally or by software vulnerabilities.
Symptoms: Website is being redirected. Unable to access websites.
How to Remove TROJ_DLOADER.JAR: Please use the Typical Threat Removal. Click here |
posted by hitech-leiza @ Monday, February 18, 2008 |
|
|
|
|
TROJ_VUNDO.ADP is a trojan horse that can download and install malware from a remote website.
Type: Trojan
Type Description: Trojan horse program is not capable of automatically spreading itself to other systems. Trojans are usually downloaded from the Internet whether intentionally or by software vulnerabilities.
Symptoms: -
How to Remove TROJ_VUNDO.ADP: Please use the Typical Threat Removal. Click here |
posted by hitech-leiza @ Monday, February 18, 2008 |
|
|
|
|
WORM_NUWAR.AR spreads by sending email messages with malicious attachments.
Type: Worm
Type Description: A worm can spread across networks and shared drives and folders. It is known to propagate using one or several of different transmission vectors like email, IRC, network shares, instant messengers and peer-to-peer networks.
Symptoms: Redirects website
How to Remove WORM_NUWAR.AR: Please use the Typical Threat Removal. Click here |
posted by hitech-leiza @ Monday, February 18, 2008 |
|
|
|
|
EXPL_PIDIEF.O a detection for an exploit code that takes advantage of multiple vulnerabilities in versions of Adobe Reader earlier than 8.1.2. For more information on the said vulnerabilities.
Type: Worm
Type Description: A worm can spread across networks and shared drives and folders. It is known to propagate using one or several of different transmission vectors like email, IRC, network shares, instant messengers and peer-to-peer networks.
Symptoms: Unwanted connection to unknown websites
How to Remove EXPL_PIDIEF.O: Please use the Typical Threat Removal. Click here |
posted by hitech-leiza @ Monday, February 18, 2008 |
|
|
|
|
JS_REALEXPLOIT.A takes advantage of a known vulnerability in several versions of the media player RealPlayer that causes a stack overflow and allows the download of possibly malicious files on the affected system.
Type: Trojan
Type Description: Trojan horse program is not capable of automatically spreading itself to other systems. Trojans are usually downloaded from the Internet whether intentionally or by software vulnerabilities.
Symptoms: Presence of files:
- C:\Program Files\NetMeeting\TestSnd.wav
- C:\Windows\Media\chimes.wav
- C:\windows\system32\BuzzingBee.wav
- C:\windows\clock.avi
- C:\Windows\Media\tada.wav
- C:\windows\system32\LoopyMusic.wav
How to Remove JS_REALEXPLOIT.A: Please use the Typical Threat Removal. Click here |
posted by hitech-leiza @ Monday, February 18, 2008 |
|
|
|
|
WORM_ONLINEG.DSO can download and drop files onto the computer. It steals information related to online games.
Type: Worm
Type Description: A worm can spread across networks and shared drives and folders. It is known to propagate using one or several of different transmission vectors like email, IRC, network shares, instant messengers and peer-to-peer networks.
Symptoms: Presence of the file %System%\amvo.exe
How to Remove WORM_ONLINEG.DSO: Please use the Typical Threat Removal. Click here |
posted by hitech-leiza @ Monday, February 18, 2008 |
|
|
|
|
JS_AUTORUN.AAF is a malicious java script embedded on websites that drops malware onto the visitors computer.
Type: Trojan
Type Description: Trojan horse program is not capable of automatically spreading itself to other systems. Trojans are usually downloaded from the Internet whether intentionally or by software vulnerabilities.
Symptoms: Presence of file %System%\VirusMawar.js
How to Remove JS_AUTORUN.AAF: Please use the Typical Threat Removal. Click here |
posted by hitech-leiza @ Monday, February 18, 2008 |
|
|
|
|
TROJ_DLOADER.EUZ is a downloader trojan that can dropped additional malware on the already infected computer.
Type: Trojan
Type Description: Trojan horse program is not capable of automatically spreading itself to other systems. Trojans are usually downloaded from the Internet whether intentionally or by software vulnerabilities.
Symptoms: Website is being redirected. Unable to access websites.
How to Remove TROJ_DLOADER.EUZ: Please use the Typical Threat Removal. Click here |
posted by hitech-leiza @ Monday, February 18, 2008 |
|
|
|
|
WORM_IRCBOT.SN can spread with network shares or can be dropped with another malware.
Type: Worm
Type Description: A worm can spread across networks and shared drives and folders. It is known to propagate using one or several of different transmission vectors like email, IRC, network shares, instant messengers and peer-to-peer networks.
Symptoms: IRC automatically sends messages: • Hey this is a pic of my new camara check it out • hey do you mind if I add this picture of us to my album? • is it ok if I add this picture of us to my eblog? • this is a new pic of me accept it ;] • This look good enough for my default? • How do we look together? • Damn I think this looks goood! • Picture editing sure is hard. Take a look! • This can't be you.... right? • OMFG, Look at this insanity!
How to Remove WORM_IRCBOT.SN: Please use the Typical Threat Removal. Click here |
posted by hitech-leiza @ Monday, February 18, 2008 |
|
|
|
|
WORM_AGENT.TBH can be obtain by visiting websites with malicious scripts.
Type: Worm
Type Description: A worm can spread across networks and shared drives and folders. It is known to propagate using one or several of different transmission vectors like email, IRC, network shares, instant messengers and peer-to-peer networks.
Symptoms: Presence of the file %Program Files%\meex.exe
How to Remove WORM_AGENT.TBH: Please use the Typical Threat Removal. Click here |
posted by hitech-leiza @ Monday, February 18, 2008 |
|
|
|
|
SYMBOS_BESELO.A is Symbian malware infects mobile devices running Symbian OS/S60 2nd Edition.
Type: Worm
Type Description: A worm can spread across networks and shared drives and folders. It is known to propagate using one or several of different transmission vectors like email, IRC, network shares, instant messengers and peer-to-peer networks.
Symptoms: Send messages with the following attached: - beauty.jpg - love.rm - sex.mp3
How to Remove SYMBOS_BESELO.A: Please use the Typical Threat Removal. Click here |
posted by hitech-leiza @ Monday, February 18, 2008 |
|
|
|
Sunday, February 03, 2008 |
WORM_VB.BWZ is a worm that can disable Windows funtions and can be downloaded without users intervention.
Type: Worm
Type Description: A worm can spread across networks and shared drives and folders. It is known to propagate using one or several of different transmission vectors like email, IRC, network shares, instant messengers and peer-to-peer networks.
Symptoms: Presence of the file %Windows%\SYSTEMIL.EXE
How to Remove WORM_VB.BWZ: Please use the Typical Threat Removal. Click here |
posted by hitech-leiza @ Sunday, February 03, 2008 |
|
|
|
|
TROJ_AGENT.FJU is a trojan that infects computer that access malicious websites.
Type: Trojan
Type Description: Trojan horse program is not capable of automatically spreading itself to other systems. Trojans are usually downloaded from the Internet whether intentionally or by software vulnerabilities.
Symptoms: -
How to Remove TROJ_AGENT.FJU: Please use the Typical Threat Removal. Click here |
posted by hitech-leiza @ Sunday, February 03, 2008 |
|
|
|
|
TROJ_DROPPER.WF is a trojan that drops additional malware on computer.
Type: Trojan
Type Description: Trojan horse program is not capable of automatically spreading itself to other systems. Trojans are usually downloaded from the Internet whether intentionally or by software vulnerabilities.
Symptoms: Presence of files: %System%\Multikz.exe %System%\user32.dat
How to Remove TROJ_DROPPER.WF: Please use the Typical Threat Removal. Click here |
posted by hitech-leiza @ Sunday, February 03, 2008 |
|
|
|
|
TROJ_DLOADER.GTZ downloads unwanted program that displays dialog box.
Type: Trojan
Type Description: Trojan horse program is not capable of automatically spreading itself to other systems. Trojans are usually downloaded from the Internet whether intentionally or by software vulnerabilities.
Symptoms: Some of Windows process are disabled.
How to Remove TROJ_DLOADER.GTZ: Please use the Typical Threat Removal. Click here |
posted by hitech-leiza @ Sunday, February 03, 2008 |
|
|
|
|
TROJ_MDROPPER.JH detection for a specially crafted .XLS file which attempts to exploit an undetermined vulnerability in Microsoft Excel.
Type: Trojan
Type Description: Trojan horse program is not capable of automatically spreading itself to other systems. Trojans are usually downloaded from the Internet whether intentionally or by software vulnerabilities.
Symptoms: -
How to Remove TROJ_MDROPPER.JH: Please use the Typical Threat Removal. Click here |
posted by hitech-leiza @ Sunday, February 03, 2008 |
|
|
|
|
TROJ_FARFLI.EY is a trojan that can modify Internet Explorer settings and donwload other malicious files
Type: Trojan
Type Description: Trojan horse program is not capable of automatically spreading itself to other systems. Trojans are usually downloaded from the Internet whether intentionally or by software vulnerabilities.
Symptoms: Website is being redirected. Unable to access websites.
How to Remove TROJ_FARFLI.EY: Please use the Typical Threat Removal. Click here |
posted by hitech-leiza @ Sunday, February 03, 2008 |
|
|
|
|
WORM_ONLINEG.DJO is a worm that may download malicious files and steals information from the infected computer.
Type: Worm
Type Description: A worm can spread across networks and shared drives and folders. It is known to propagate using one or several of different transmission vectors like email, IRC, network shares, instant messengers and peer-to-peer networks.
Symptoms: Presence of the files: %System%\amvo.exe %System%\amvo0.dll Temp%\zhklagpv.dll
How to Remove WORM_ONLINEG.DJO: Please use the Typical Threat Removal. Click here |
posted by hitech-leiza @ Sunday, February 03, 2008 |
|
|
|
|
WORM_BRUTEC.A is a worm that spreads on floppy drive and can be acquired by visiting malicious websites
Type: Worm
Type Description: A worm can spread across networks and shared drives and folders. It is known to propagate using one or several of different transmission vectors like email, IRC, network shares, instant messengers and peer-to-peer networks.
Symptoms: Presence of the file %System%\BCfolder.exe
How to Remove WORM_BRUTEC.A: Please use the Typical Threat Removal. Click here |
posted by hitech-leiza @ Sunday, February 03, 2008 |
|
|
|
|
WORM_VB.XT is a worm that spreads by creating a copy of itself on removable drives.
Type: Worm
Type Description: A worm can spread across networks and shared drives and folders. It is known to propagate using one or several of different transmission vectors like email, IRC, network shares, instant messengers and peer-to-peer networks.
Symptoms: Presence of the files: %System%\BttnServ.exe %Windows%\svchost.exe %Windows%\winst.log
How to Remove WORM_VB.XT: Please use the Typical Threat Removal. Click here |
posted by hitech-leiza @ Sunday, February 03, 2008 |
|
|
|
|
WORM_VB.CAC is a wprm that spreads on removable drives by creating an autorun and run itself when volume is accessed.
Type: Worm
Type Description: A worm can spread across networks and shared drives and folders. It is known to propagate using one or several of different transmission vectors like email, IRC, network shares, instant messengers and peer-to-peer networks.
Symptoms: Spreads on removable drives by autorun.inf with command printer.exe
How to Remove WORM_VB.CAC: Please use the Typical Threat Removal. Click here |
posted by hitech-leiza @ Sunday, February 03, 2008 |
|
|
|
|
TROJ_BANLOAD.AQ is a trojan that can download additional malware on computer.
Type: Trojan
Type Description: Trojan horse program is not capable of automatically spreading itself to other systems. Trojans are usually downloaded from the Internet whether intentionally or by software vulnerabilities.
Symptoms: Presence of file %Windows%\comWab.exe
How to Remove TROJ_BANLOAD.AQ: Please use the Typical Threat Removal. Click here |
posted by hitech-leiza @ Sunday, February 03, 2008 |
|
|
|
|
BKDR_FEEBS.OC can be dropped and execute on computer without users intervention.
Type: Backdoor Trojan
Type Description: Backdoor Trojan is a malicious program created by an attacker to gain remote access and perform various modification on victims computer.
Symptoms: -
How to Remove BKDR_AGENT.AAFS: Please use the Typical Threat Removal. Click here |
posted by hitech-leiza @ Sunday, February 03, 2008 |
|
|
|
|
TROJ_AKJR.A is a memory resident trojan that autostart itself whenever Windows starts.
Type: Trojan
Type Description: Trojan horse program is not capable of automatically spreading itself to other systems. Trojans are usually downloaded from the Internet whether intentionally or by software vulnerabilities.
Symptoms: Presence of files: %System%\F_Server.dll %System%\F_Server.exe
How to Remove TROJ_AKJR.A: Please use the Typical Threat Removal. Click here |
posted by hitech-leiza @ Sunday, February 03, 2008 |
|
|
|
|
BKDR_AGENT.AAFS opens a backdoor port on the infected computer allowing remote unauthorized access.
Type: Backdoor Trojan
Type Description: Backdoor Trojan is a malicious program created by an attacker to gain remote access and perform various modification on victims computer.
Symptoms: Website is being redirected. Unable to access websites.
How to Remove BKDR_AGENT.AAFS: Please use the Typical Threat Removal. Click here |
posted by hitech-leiza @ Sunday, February 03, 2008 |
|
|
|
|
PE_PAGIPEF.AW-O a worm that infects Portable Executable file to spread itself.
Type: Worm
Type Description: A worm can spread across networks and shared drives and folders. It is known to propagate using one or several of different transmission vectors like email, IRC, network shares, instant messengers and peer-to-peer networks.
Symptoms: Presence of the files: %System Root%\NetApi00.sys %System%\Com\lsass.exe %System%\Com\netcfg.000 %System%\Com\netcfg.dll %System%\Com\smss.exe %System%\dnsq.dll
How to Remove PE_PAGIPEF.AW-O: Please use the Typical Threat Removal. Click here |
posted by hitech-leiza @ Sunday, February 03, 2008 |
|
|
|
Free Stuff |
|
Ads |
Sidebar
|
Archives |
|
Powered by |
|
|