Fake Scanner Sites
Google Search Redirects
SpyNoMore Anti-Spyware: Spyware Removal Database - G
Review spyware removal database by categories:
Review spyware removal database in alphabetical order:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
G-Spot Bot 1.5
G-Spot Tight 1.0
G-Spot www 1.0
G-Spot www 2.0
This program overloads the connection by pinging. That causes a DoS attack. DoS attacks may affect the work of your server or jam IRC channels. However, almost every self-respecting IRC channel is protected by special Flood detection algorithms. Flooders also may contain some pesky 'backdoor' or 'nuker' programs. It was created in April, 1997, and needs at least 5 Kb for storage.
Gaban Bus 1.12
Gaban Bus 2.0
Gabest Media Player Classic
Adware is any software application in which advertising is displayed while the program is running. The authors of these applications include additional code that delivers the ads, which can be viewed through pop-up windows or through a bar that appears on a computer screen and sometimes through text links or in search results. Adware may or may not track personal information. It may also gather information anonymously or in aggregate only.
Gain Local Administrator Access on NT
Gain root from a suid script or program
This RAT program was designed for Windows NT/2000 operating systems. The author of this pest is a hacker called Wollf. It originated in March 2002. A Remote Administration Tool is a special kind of hacker spyware, used for remote access and control of other people's computers. The attacker infects the PC via the e-mail or File and Print Sharing. A "server" allows him to connect via a "client" on his own machine. The functions of a RAT may vary, depending on the needs of the hacker. Some RATs can't really harm your PC and the only purpose they were made for is hooliganism. But some versions can steal vital information, delete files and even crash your system. This pest uses "backdoor" and "trojan" abilities to gain the intruder a completely invisible access to your computer.
In viruses and trojans, the dropper is the part of the program that installs the hostile code onto the system.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16