Main Menu
Home
Bookmark
Contact Us



 
Rustock Backdoor Information

Name: Rustock
Category: Backdoor
Advice: Remove
Risk: High Risk High risk threats typically are remotely exploitable vulnerabilities, which can lead to system compromise. Successful exploitation does not normally require any interaction. May open up communication ports, use polymorphic tactics, stealth installations, and/or anti-spy counter measures. May use a security flaw in the operating system to gain access to your computer.
Description:

Type: Backdoor - A Trojan software is any software on a user's computer that the user is not aware or intentionally installed. Most Trojan software is designed to perform some sort of actions that could jeopardize the user's security or privacy.



Top Backdoor Visited Pages:
Unicorn - 268 visits
Blue Eye IRC Bot V 2.0 - 208 visits
SkatanBot - Alias: Backdoor.VB.kl - 138 visits
Backdoor:Win32/Lamebot.A - 127 visits
Backdoor.Perl.AEI.16 - 107 visits
RBot.sysdat - Alias: Backdoor:Win32/Rbot!E89C - 107 visits
Trojan.Backdoor.Darkmoon - Alias: Backdoor:Win32/Darkmoon.AZ - 105 visits
Delf.gb - Alias: RVP - 103 visits
Trojan.Fakespy.A - Alias: Trojan.Zlob.B - 101 visits
BackDoor.Galapop.A - Alias: Trojan.Abwiz.D (Symantec), Galapoper (Mcafee) - 100 visits

Random Backdoor Pages:
Delp.jb
Afcore.BN
Haxdoor.e
SrvCmd.b
Backdoor.Win32.Kikz
Haxdoor.A
Trojan.AML - Alias: BackDoor.AML
Backdoor.Win32.LanaFTP.a
IRCBot.gen
Ciadoor.12.b


 


2006-2008 spyware32.com - Privacy Policy