| 
				
 
 
 
 
 
| Nome: | Alex Rojer  |  | E-mail: | qatro  ymail.com |  | Homepage: | http://good-spyware.freehostia.com |  | Quando: | 28/07/2008, alle 06:29 (UTC) |  | Messaggio: | <a href="http://good-spyware.freehostia.com/">Spyware</a> - the so-called spyware modules collect any 
 confidential information
 Browser Hijack - modules, which are aimed at changing some components of the browser - to change the start
 
 page, installing a proxy server, adding references in the "favorite", installation toolbar (toolbar), etc.
 Trojan Horses - "Trojan horses" or "logic bombs". "Troyan" on a computer can perform totally different
 
 things from the most harmless to dangerous. For example, he may nominate a CD-ROM, forcing arbitrarily move
 
 the mouse around the screen, show a message with obscene curse word. At this effect "trojan" does not end -
 
 it can steal, delete or modify files, etc. However, the possibility of the virus depends on the imagination
 
 well, it has sent.
 Usually "Trojan horse" does not operate in isolation, and attached to any program, like internat.exe. One
 
 of the varieties "trojans" is intended for remote administration. Typically, these "horses" are composed of
 
 two parts: the server and client. One half of "Trojan" remains with the hacker, while another victim is
 
 sent. When the virus is activated on the remote machine, the level of network security falls to zero, since
 
 such a computer is entirely at the mercy of detractors.
 There are also "Trojan horses", collect passwords from your computer and sends them to the specified
 
 address. The most popular way to disseminate the Trojan - by mail.
 |  
 
 
 
 
 |   |