Bro ! I do understand that known trojans are easy to be detected, but what about those which are yet to discover?
I can tell you one thing trojan is not just piece of code which can be downloaded through other softwares. Sometimes, some websites do spread...
Thanks NEO_VI for this useful info for all. I hope SOME KNOWN Trojans can be recognized now by beginners too. Just use netstat -a to know what...
Do you think a normal user who is not from COMPUTERS background can decide which process is useful and which is harmful. using SYSINTERNALS suites...
I am saying the same thing Bro! Just read again what I wrote. I am saying that Very Few People give passwords for Administrator Account. If you...
Sometimes extra powerful anti-viruses can give you false warnings. Kaspersky is good example for this. I just developed an application which...
I think FOR HANDLING VIRUSES, YOU SHOULD PREFER ANTI-VIRUS or INTERNET SECURITY. KASPERSKY or AVIRA is a good option. Isn't it NEO_VI ? Rest I...
Hi all ! Who so ever has used Vista must be annoyed of some dialogs asking for permissions whenever installing/un-installing softwares or deleting...
Backtrack is for those who love to test the limits of security. Its a damn packed with lots of tools Linux DISTRO.
If anti-viruses are as good as you are saying then you should read the news. A trojan lasted for 3 years, infected the PCs, collected the details...
A batch can done the complete damage. Why not code this file using C++ or C, then nobody will be able to see the source code even
Think of a program which connects to internet For example FTP Client, which needs access to internet to make uploads/downloads but someone has...
Yes, Firewall can help you.but........ Bro, If you have studied the behavior of TROJANS, there are many of them which are coded to bypass your...
Server Trojan Server Trojans are again the programs which when installed on victim's machine, then those machines can be used as base for...
Bro ! Why don't you share working knowledge here regarding using these trojans ? It would be good for all.
Archiving the keygens is different thing and using them is another aspect. If you have to use a keygen, you must have to extract, means it will...
Downloaders Downloader is damn impressive implementation of client - server based programming. It has again 2 parts client and server....
Data Destruction Trojan Now another category is DATA Destruction Trojans. These kinds of trojans are quite simlar to RATs, but the purpose of...
So, I wish you gud luck bro in that case.
RATs Lets talk about categories of Trojans. Trojans are categorized as follows as: Remote Access Data Destruction Downloader Server...
Separate names with a comma.