English Deutsch Français Italiano Español Português 繁體中文 Bahasa Indonesia Tiếng Việt ภาษาไทย
All categories

This crap is invading my PC!! What is it and how does it work??

2007-01-26 12:24:06 · 5 answers · asked by Anonymous in Computers & Internet Hardware Desktops

5 answers

http://siri.urz.free.fr/Fix/SmitfraudFix_En.php
run this in safemode and follow onscreen directions

2007-01-26 12:29:18 · answer #1 · answered by Neo 5 · 0 0

Trojan Horse is an apparently useful and innocent program containing additional hidden code allowing the unauthorized collection, exploitation, falsification, or destruction of data. A Trojan horse is a program in which malicious or harmful code is contained inside apparently harmless programming in such a way that it can get control and do its chosen form of damage, such as ruining a hard disk. A Trojan horse may be widely redistributed as part of a computer virus.

Trojan Horse is a computer program is either hidden inside another program or that masquerades as something it is not in order to trick potential users into running it. For example a program that appears to be a game or image file but in reality performs some other function. A Trojan Horse is a malicious program that is written soley to cause damage or disrupt the normal operation of a computer. They usually have a name that makes them appear to be a useful or important program, that tricks a user into starting them. When the user clicks on the file, it releases its payload.

A Trojan horse is a malicious program that is disguised within legitimate software. There are two common types of Trojan horses. A useful software that has been corrupted by a hacker with malicious code that executes while the program is used. The other type is a standalone program that pretends to be something else, like a game or image file, in order to trick the user into some misdirected way that is needed to carry out the program's objectives.

Trojan horse programs cannot operate by themselves but in contrast to some other types of malware like viruses or worms. If trojans replicate and even distribute themselves then each new victim must run the program/trojan. trojan horse, stopping trojan horse, detecting trojan horse, removing trojan horse, blocking trojan horse, computer security, online information

Click bottom URL for free 15 day trial of Norton's Antivirus, to scan, detect, and remove any viruses. Other "Free" programs only scan and detect but then you need to "buy or upgrade" to delete any viruses.

2007-01-26 12:43:22 · answer #2 · answered by Big C 6 · 0 0

It is a bugger!

Seriously, I tried loads of anti-virus and spyware solutions, but to no avail. It self generates. I ended up going on a forum and a very kind soul helped me kill it.

Hang on a minute ... I'll find the address ...

http://www.techspot.com/vb/topic58138.html

The bloke was really helpful

2007-01-26 12:31:52 · answer #3 · answered by Bob Danvers-Walker 4 · 0 0

I wouldn't worry so much on what it is, as I would on how to get rid of it.

Read this, follow instructions to a T!

http://www.symantec.com/smb/security_response/writeup.jsp?docid=2004-112210-3747-99

2007-01-26 12:30:32 · answer #4 · answered by mesen256 2 · 0 0

its a virus get rid of it as sone as posable

2007-01-26 14:40:54 · answer #5 · answered by dragonslayer 2 · 0 0

fedest.com, questions and answers