TrojanHunter is an advanced trojan scanner and toolbox, that searches for and removes trojans from your system. It uses several proven methods to find a wide variety of trojans such as file scanning, port scanning, memory scanning and registry scanning. The difference to many other trojan scanners is that TrojanHunter also allows you to add custom trojan definitions and detection rules using the easy to understand dialogs. It includes several additional tools, including a NetStat viewer, Memory String Extractor, Process Viewer, Auto-Start Explorer and various plug-ins for advanced users. TrojanHunter comes with a Live Update features that keeps the Trojan signatures current.
TrojanHunter is a powerful application designed to detect and remove trojans. With its unique scan engine capable of searching every hiding spot on your computer for trojans, you can be assured of having the most advanced trojan protection available. Featuring an intuitive user interface and a scanner capable of thoroughly examining your files, system registry, open ports and running processes it gives you all-round protection against trojans. With an easy-to-use Scanner and a Guard that scans in the background TrojanHunter is a must-have complement to your virus scanner.
A harmful virus is currently in circulation that disconnects computers from the Internet and only releases the connection again after a code has been entered that can only be obtained from an expensive premium SMS service. Avira has been aware of the malware for some time and protects its users accordingly.
The blackmail Trojan currently being reported by the media is disguised as an installation program for a download manager. If a user runs the program, however, all he will see is a message in Russian claiming he has violated the conditions for use. The malware then blocks the computer’s Internet connection and requires the user to obtain a release code using a costly premium SMS service.
Spyware Doctor provides three-way spyware protection for your PC through real-time threat blocking, advanced system scanning and immunization against known browser infections. Spyware Doctor is a multi-award winning spyware removal utility that detects, removes and protects your PC from thousands of potential spyware, adware, Trojans, keyloggers, spybots and tracking thrats. Protect your privacy and computing habits from prying eyes and virtual trespassers with the help of Spyware Doctor.
Anti-virus software and firewalls do not fully protect your system against the majority of spyware and privacy threats. Because spyware is commonly bundled with software downloads, attached to e-mails, or transmitted through networks it can appear to be legitimate software, but once installed it can be nearly impossible to detect and remove without the help of a dedicated spyware removal tool like Spyware Doctor.
Kaspersky Internet Security 2010 automatically protects you and your family at all times – whether you work, bank, shop or play online.
Kaspersky Internet Security 2010 has everything you need for a safe and secure Internet experience.
All the features and technologies of Kaspersky Anti-Virus 2010 are included in this product.
Kaspersky Internet Security stops your PC being slowed down by cybercriminals and delivers unsurpassed on-line safety whilst protecting your files, music and photos from hackers:
As mobile phones evolve so too do the malicious software, situations, and perpetrators of such that they can fall prey to. It is imperative that all users of mobile phones remember that other people can and will use your cell phone to invade your privacy and personal space without ever even dialing your mobile phone number.
Because mobile phones have the marvelous talent for keeping a record of all calls made and received, they have become an obvious target for unscrupulous activity. Back in 2006, a number of reports appeared on the internet regarding a company that was marketing a piece of software capable of embedding itself in a mobile phone and remotely transmitting this "call log" to someone else's server.
There are basically 3 ways for you to attempt to get vic's:
1. Trick them into running the server themselves
2. Physically install the server yourself
3. Scan for vic's already infected
The easiest method is method 3. Use an AOL IP range, and you will find victims almost instantaneously. Most likely you will tire of these victims quickly, as there is no challenge in this method and also no challenge in the victim's themselves (reason being they use AOL, 'nuff said).
The hardest method is method 2. I won't go into details with this method, use your imagination if you attempt this method. Method 1 is the most popular method, and without method 1, method 3 would not be as productive as it is. To use method 1, you need to hide the trojan server in another file and convince the future victim to run this file. To hide the server, you need to use a binder program. I recommend Joiner. Joiner allows you to bind your server to an exe fileor a jpeg.
Joiner is very easy to use; just tell it the 2 files you want to bind and it will leave a copy of the new file in the joiner folder. You may want to use a program such as Microangelo to change the icon of the new file so as not to appear suspicious.
As soon as the future victim runs this file, whether it be a picture or a game, the server will install itself onto their PC without them knowing. Okay, so what happens after the victim runs the file? He gets online, he gets scanned by someone else who connects to him and he is theirs. So all of your efforts are wasted unless you edit the server before binding it. Most of the popular trojans offer an edit server program. Run this program (NEVER run the server itself) to set options such as if you want to be notified by ICQ,IRC or email when the victim gets online, if you want the server to be password protected, and other options to ensure the victim is yours and cannot be claimed by someone else.
One problem with the servers that offer all these options is they are usually pretty large files, meaning it would be almost impossible to bind them with a jpeg and convince someone to actually run it. If you are on ICQ, and someone sends you a pic, but it takes 2 minutes to download, would you run it? This can be solved quite easily. You want to infect the future victim with Sub7.
Sub7's server is fairly large. Go download a tiny trojan like the Thing or MiniCommand. These small trojans don't offer much more than upload, download, and run file capabilities. They are tiny. Bind their server using Joiner to a file and tell Joiner to notify you by ICQ when the victim goes online. Once you are notified, use the client for the Thing or MiniCommand, connect to the server, and upload the Sub7 server. Once you upload the sub7 server, run it. Now you can delete the first mini server and connect with your Sub7 client.(authormg.virtualave.net.)
Microsoft Security Essentials provides real-time protection for your home PC that guards against viruses, spyware, and other malicious software.
Microsoft Security Essentials is a free* download from Microsoft that is simple to install, easy to use, and always kept up to date so you can be assured your PC is protected by the latest technology. It’s easy to tell if your PC is secure — when you’re green, you’re good. It’s that simple.
Microsoft Security Essentials runs quietly and efficiently in the background so that you are free to use your Windows-based PC the way you want—without interruptions or long computer wait times.
Download Microsoft Security Essentials for XP | Microsoft Security Essentials for Vista 32bit