IP

Showing posts with label Computer Viruses. Show all posts
Showing posts with label Computer Viruses. Show all posts

Wednesday, December 29, 2010

How To Remove Security Tool


 To Remove Security Tool and other Rogue/Fake Antivirus Malware
If you have a PC infected with Security Tool, you’re probably reading this article so you can understand how to get rid of it. Thankfully we’ve got the instructions to help you get rid of this virus.
Security Tool is just one of many fake antivirus applications like Antivirus Live, Advanced Virus Remover, Internet Security 2010, and others that hold your computer hostage until you pay their ransom money. They tell you that your PC is infected with fake viruses, and prevent you from doing anything to remove them.
image
This particular virus blocks you from doing most things, like Task Manager…
sshot-2010-01-21-[00-28-01]-[1]
It also gives you loads of error messages that just seem to pop up constantly.
sshot-2010-01-21-[00-30-29]-[1]
And worse, it blocks you from running malware removal tools:
sshot-2010-01-21-[00-34-56]-[1]
First we’ll walk through the general steps that usually apply, but you can skip down to read the specific steps that we used to remove this virus.
Removing Rogue Fake Antivirus Infections (General Guide)
There’s a couple of steps that you can generally follow to get rid of the majority of rogue antivirus infections, and actually most malware or spyware infections of any type. Here’s the quick steps:
  • Try to use the free, portable version of SUPERAntiSpyware to remove the viruses.
  • If that doesn’t work, reboot your PC into safe mode with networking (use F8 right before Windows starts to load)
  • Try to use the free, portable version of SUPERAntiSpyware to remove the viruses.
  • Reboot your PC and go back into safe mode with networking.
  • If that doesn’t work, and safe mode is blocked, try running ComboFix
  • Note that I’ve not yet had to resort to this, but some of our readers have.
  • Install MalwareBytes and run it, doing a full system scan. 
  • Reboot your PC again, and run a full scan using your normal Antivirus application (we recommend Microsoft Security Essentials).
  • At this point your PC is usually clean.
Those are the rules that normally work. Note that there are some malware infections that not only block safe mode, but also prevent you from doing anything at all. We’ll cover those in another article soon, so make sure to subscribe to How-To Geek for updates (top of the page).
Removing Security Tool
Since the above steps don’t always work, and Security Tool seemed to do a pretty good job of killing the malware removal tools I tried to use, I found another method to kill the virus off so I could begin the work of removing it.
First, we’ll need to know the username—if you aren’t sure what that is, right-click on the Start button and choose Open, then you can see it right in the location bar:
image
Next, open up the Start Menu, and then click the Run button (or use the Win+R shortcut key), and then type in the following command, substituting your own username if it is something other than administrator.
taskkill /f /fi “username eq administrator”
Note: If it doesn’t kill the virus the first time, you might have to use it again. Don’t be alarmed when your start menu disappears.
image
If all went well, the virus is dead and so is everything else including your start menu. Use the Ctrl+Shift+Esc shortcut key combination, and then go to File –> Run, and type in explorer to re-open the start menu and taskbar.
image
Note: If you find that the virus still isn’t dead, you can repeat the steps again.
Use SUPERAntiSpyware to Clean the Malware
Now that we’ve killed off all those processes, we’ll get to removing the actual malware from the system by downloading SUPERAntiSpyware and installing it. You should be able to grab the full version, or you can use the portable variety that we’ve already recommended.
image
If you grabbed the full version, make sure to use the Check for Updates button, and then click the Scan Your Computer button… make sure to perform a Complete Scan, and select all of your drives. 
image
Once it’s done, it’ll let you remove them all in a click, and then prompt you to reboot. Job isn’t done, however!
Install Malwarebytes and Scan 
Next you’ll want to install MalwareBytes and run it, making sure to run a full scan. The main reason to do this is because there’s no way a single malware removal tool can know about every single piece of malware out there, and you may as well make sure your system is clean.
image65
Install Microsoft Security Essentials
You should definitely install Microsoft Security Essentials and run another full scan once you’re done.
Note: If you used a thumb drive at any point during this process, you should make sure and scan that as well—I’ve had viruses hop over to the thumb drive, ready to infect the next machine.

Saturday, December 25, 2010

What is backdoors





A backdoor is a program or a set of related programs that a hacker installs on the victim computer to allow access to the system at a later time. A backdoor’s goal is to remove the evidence of initial entry from the systems log. But a “nice” backdoor will allow a hacker to retain access to a machine it has penetrated even if the intrusion factor has in the meantime been detected by the system administrator. Resetting passwords, changing disk access permissions or fixing original security holes in the hope of remedying the problem may not help.


A trivial example of a backdoor is default BIOS, router or switch passwords set either by careless manufacturers or security administrators.


A hacker could simply add a new user account with administrator privileges and this would be a sort of backdoor, but far less sophisticated and easy detectable.


Adding a new service is the most common technique to disguise backdoors in the Windows operating system. This requires involving tools such as Srvany.exe and Srvinstw.exe that comes with the Resource Kit utility and also with Netcat.exe [1]. The principle of this operation is that the srvany.exe tool is installed as a service and then permits netcat.exe to run as a service. The latter, in turn, listens on an appropriate port for any connection. Once connected, it will have spawned a remote shell on the server (using cmd.exe) and from this moment onwards, a hacker has free reign.


Just before commencing the installation of a backdoor, a hacker must investigate within the server to find activated services. He could simply add a new service and give it an inconspicuous name, but he would be better off choosing a service that never gets used and that is either activated manually or even completely disabled. It is sufficient to remove it using the Srvinstw.exe utility and again to install a new service with the same name.  By doing so, the hacker considerably reduces possibility that the administrator will detect the backdoor during a later inspection. Whenever an event occurs, the system administrator will focus on looking for something odd in the system, leaving all existing services unchecked. From the hacker point of view, it is essential to hide files deeply in system directories to protect them from being detected by the system administrator. In time, a hacker will think of naming the tools to be planted on the server disk. Netcat.exe and Srvany.exe are utilities that are required to run continuously and will be seen in the task manager. Hackers understand that backdoor utilities must have names that will not attract any undue attention. They use the same approach when choosing an appropriate port for a backdoor. For example, port 5555 does not seem to be backdoored for the reason that it could immediately tip off the system administrator.


The technique presented above is very simple but efficient at the same time. It allows a hacker to get back into the machine with the least amount of visibility within the server logs (we are obviously not speaking about situations where extra software is used to monitor traffic and there is an efficient event logging system installed). Moreover, the backdoored service allows the hacker to use higher privileges – in most cases as a System account. This may cause some problems for an intruder because, notwithstanding the highest permissions, the System account has no power outside the machine. Under this account, disk mapping or adding user accounts is not possible. Instead, passwords can be changed and privileges may be assigned to existing accounts. With a backdoor that has captured the system administrator account, no such restrictions exist. The only problem that remains is related to the change of user password, because a password update is required to restart the related service. An administrator will undoubtedly start noticing log errors, once care for event logging and monitoring is provided. The example given above describes a backdoor that is the most dangerous one from the victim system point of view, because anyone can connect to it and obtain the highest permissions with no authentication required. It may be any scriptkiddie using a portscanning tool against computers randomly selected from the Internet.


Hacker–dedicated Web sites give examples of many tools that serve to install backdoors, with the difference that once a connection is established the intruder must login by entering a predefined password. iCMD [2], Tini [3], RemoteNC [4] or WinShell [5] (are examples of tools resembling Telnet.





WinShell program may be used to install certain simple backdoors
I once saw a very interesting script named CGI-backdoor [6]. I considered this to be interesting because an attacker could execute remote commands on the server via WWW. It was a specifically created totally dynamic .asp site written in VBScript (available also in Perl, PHP, Java and C) that enabled one to execute commands on the server using the default command processor cmd.exe. A hacker can exploit this to configure the reverse WWW script on the victim’s system but can only permitted by default with sufficient privileges to the IUSR_MACHINE account. This script can be used without logging at all, thus no traces are left on the system. Its additional advantage is that it does not listen in on any port but translates between the HTML used in WWW pages and the server that runs interactive websites.
In order to create backdoors, hackers can use commercially available tools such as Remote Administrator [7], or free available TightVNC [8], that apart from a full control over the computer also allow one to operate a remote console.

Sunday, December 19, 2010

10 Tips to Avoid Getting Adware


10 Tips to Avoid Getting Adware

Adware, malware, spyware and viruses can bring your system to its knees. They are detrimental, lowering the performance of your computer. You might need to replace data. You might lose unique files. Keep the nasties away from your computer using these ten simple tips.


1. Use Firefox: Internet Explorer is the most popular browser on the market, controlling over 50% of the market share. The virus and adware creators specifically look for exploitable vulnerabilities within IE because they know that they will receive the best return on investment. Your switch to Firefox prevents some adware from infecting your machine.


2. Scan your PC once a week: Sometimes adware programmers take a sneaky approach. They will set up their programs to run quietly in the background to spy upon your activities. This once a week scan is necessary to remove any of those sneaky bugs.


3. Download from known sites: New sites for installing adware are popping up all the time. If you find something that you want to download, make sure that it is from a known site. A company like Amazon will not steer you wrong, but Bob’s House of Wares might be a little less trustable. If you are not sure whether you can trust a site, perform a quick search.


4. Install Adaware: Ad-Aware is the most popular free adware removal program on the market. It detects, quarantines and removes adware. It searches for other programs which may have been installed, highlighting them in an easy to use interface. This program does not have an anti-virus attached.


5. Do not click on unsolicited email: You are constantly receiving offers to increase this or improve that through unsolicited email. Your curiosity may be killing you, but don’t click on these emails. They accept your click as permission to install adware, spyware and malware on your PC.


6. Install Antivirus software: Installing two programs for virus and adware protection is a smart idea. It caters to the strengths of each program, increasing the overall strength of your antiadware and antiviral campaign. Some of the best antivirus software is free, providing real time protection. Programs to look at would be Avast Antivir and AVG.


7. Don’t install toolbars: Even some reputable sites install custom toolbars. They slow your system down and collect information about your surfing habits. While a toolbar might offer some perks, it may also diminish your experience by dragging your system to a halt. Toolbars from less reputable places install adware and sometimes infect your system outright.


8. Look at your task manager: If anything seems out of place with your computer, take a look at your task manager. This tells you about all of the programs and processes which are running on your computer. Examine the processes tab for anything which you don’t immediately recognize. Perform a web search for unfamiliar processes.


9. Do not click on popups: Clicking on a popup usually spells certain doom for your computer. It opens the door for the viruses and adware that want to infect your machine, telling these malicious applications to make themselves at home. Stay away from those constantly advertised screensavers and icons.


10. Trust your gut: If you don’t feel right about a site, don’t go there. If you are receiving warnings from the antivirus and antiadware programs which you’ve installed, don’t go there. If you don’t like the layout of a site, don’t go there. Trust your instincts about sites.
With proper vigilance, you can keep aggravating adware, spyware and malware from your machine. Trust your instincts. Install Ad-Aware and an antivirus program. Play it safe. The care you spend in preventing adware from infecting your machine can save money and time.


This article was added by James Adams who is currently a writer and analyst at a supplier of printer cartridges and franking machine supplies. Much of his writing is about using advertising and productivity to help growth.

Sunday, December 12, 2010

Saturday, December 11, 2010

Trojan- Trojan horses



The most important difference between a trojan virus/trojan horse and a virus is that trojans don’t spread themselves. Trojan horses disguise themselves as valuable and useful software available for download on the internet. Most people are fooled by this ploy and end up dowloading the virus disguised as some other application. The name comes from the mythical "Trojan Horse" that the Ancient Greeks set upon the city of Troy.

A trojan horse is typically separated into two parts – a server and a client. It’s the client that is cleverly disguised as significant software and positioned in peer-to-peer file sharing networks, or unauthorized download websites. Once the client Trojan executes on your computer, the attacker, i.e. the person running the server, has a high level of control over your computer, which can lead to destructive effects depending on the attacker’s purpose.

A trojan horse virus can spread in a number of ways. The most common means of infection is through email attachments. The developer of the virus usually uses various spamming techniques in order to distribute the virus to unsuspecting users. Another method used by malware developers to spread their trojan horse viruses is via chat software such as Yahoo Messenger and Skype. Another method used by this virus in order to infect other machines is through sending copies of itself to the people in the address book of a user whose computer has already been infected by the virus.

Types of Trojan Horse Viruses
Trojan Horses have developed to a remarkable level of cleverness, which makes each one radically different from each other. For an inclusive understanding, we have classified them into the following:

Remote Access Trojans

Remote Access Trojans are the most frequently available trojans. These give an attacker absolute control over the victim’s computers. The attacker can go through the files and access any personal information about the user that may be stored in the files, such as credit card numbers, passwords, and vital financial documents.

Password Sending Trojans

The intention of a Password Sending Trojan is to copy all the cached passwords and look for other passwords as you key them into your computer, and send them to particular email addresses. These actions are performed without the awareness of the users. Passwords for restricted websites, messaging services, FTP services and email services come under direct threat with this kind of trojan.

Key Loggers

Key Loggers type of Trojans logs victims’ keystrokes and then send the log files to the attacker. It then searches for passwords or other sensitive data in the log files. Most of the Key Loggers come with two functions, such as online and offline recording. Of course, they can be configured to send the log file to a specific email address on a daily basis.

Destructive Trojans

The only purpose of Destructive Trojans is to destroy and delete files from the victims’ computers. They can automatically delete all the core system files of the computer. The destructive trojan could be controlled by the attacker or could be programmed to strike like a logic bomb, starting on a particular day or at specific time.

Denial of Service (DoS) Attack Trojans

The core design intention behind Denial of Service (DoS) Attack Trojan is to produce a lot of internet traffic on the victim’s computer or server, to the point that the Internet connection becomes too congested to let anyone visit a website or download something. An additional variation of DoS Trojan is the Mail-Bomb Trojan, whose key plan is to infect as many computers as possible, concurrently attacking numerous email addresses with haphazard subjects and contents that cannot be filtered.

Proxy/Wingate Trojans

Proxy/Wingate Trojans convert the victim’s computer into a Proxy/Wingate server. That way, the infected computer is accessible to the entire globe to be used for anonymous access to a variety of unsafe Internet services. The attacker can register domains or access pornographic websites with stolen credit cards or do related illegal activities without being traced.

FTP Trojans

FTP Trojans are possibly the most simple, and are outdated. The only action they perform is, open a port numbered 21 – the port for FTP transfers – and let anyone connect to your computer via FTP protocol. Advance versions are password-protected, so only the attacker can connect to your computer.

Software Detection Killers

Software Detection Killers kill popular antivirus/firewall programs that guard your computer to give the attacker access to the victim’s machine.

Note: A Trojan could have any one or a combination of the above mentioned functionalities.

The best way to prevent a Trojan Horse Virus from entering and infecting your computer is to never open email attachments or files that have been sent by unknown senders. However, not all files we can receive are guaranteed to be virus-free. With this, a good way of protecting your PC against malicious programs such as this harmful application is to install and update an antivirus program.

Trojan Port 
  • TCP 1 Breach.2001, SocketsDeTroie.230, SocketsDeTroie.250
  • TCP 28 Amanda.200
  • TCP 31 MastersParadise.920
  • TCP 68 Subseven.100
  • TCP 142 NetTaxi.180
  • TCP 146 Infector.141, Intruder.100, Intruder.100
  • TCP 171 ATrojan.200
  • TCP 285 WCTrojan.100
  • TCP 286 WCTrojan.100
  • TCP 334 Backage.310
  • TCP 370 NeuroticKat.120, NeuroticKat.130
  • TCP 413 Coma.109
  • TCP 420 Breach.450
  • TCP 555 Id2001.100, PhaseZero.100, StealthSpy.100
  • TCP 623 Rtb666.160
  • TCP 660 Zaratustra.100
  • TCP 661 Noknok.800, Noknok.820
  • TCP 666 BackConstruction.210, BackConstruction.250, Bla.100, Bla.200, Bla.400, Bla.503, Cain.150, Dimbus.100, Noknok.820, Ripper.100, SatansBackdoor.100, SatansBackdoor.101, SatansBackdoor.102, Unicorn.100, Unicorn.101, Unicorn.110
  • TCP 667 SniperNet.210, Snipernet.220
  • TCP 668 Unicorn.101, Unicorn.110
  • TCP 680 Rtb666.160
  • TCP 777 Tiny.100, Undetected.230, Undetected.300, Undetected.310, Undetected.320, Undetected.330, Undetected.331, Undetected.332
  • TCP 785 NetworkTerrorist.100
  • TCP 800 NeuroticKitten.010
  • TCP 831 NeuroticKat.100, NeuroticKat.120, NeuroticKat.130
  • TCP 901 NetDevil.130, NetDevil.140
  • TCP 1000 DerSpaeher.200
  • TCP 1001 Silencer.100
  • TCP 1008 AutoSpy.100
  • TCP 1010 DerSpaeher.200
  • TCP 1015 Doly.150
  • TCP 1111 TPort.100
  • TCP 1130 Noknok.800, Noknok.820
  • TCP 1207 SoftWAR.100
  • TCP 1243 Subseven.100, SubSeven.110, SubSeven.180, SubSeven.190, Subseven.200
  • TCP 1245 VoodooDoll.006
  • TCP 1269 Matrix.130
  • TCP 1480 RemoteHack.130
  • TCP 1568 RemoteHack.100, RemoteHack.110
  • TCP 1600 DirectConnection.100
  • TCP 1601 DirectConnection.100
  • TCP 1602 DirectConnection.100
  • TCP 1634 NetCrack.100
  • TCP 1784 Snid.120, Snid.212
  • TCP 1999 TransmissionScout.100, TransmissionScout.110
  • TCP 2000 ATrojan.200, InsaneNetwork.400
  • TCP 2001 DIRT.220, TrojanCow.100
  • TCP 2003 TransmissionScout.100, TransmissionScout.110
  • TCP 2023 RipperPro.100
  • TCP 2040 InfernoUploader.100
  • TCP 2115 Bugs.100
  • TCP 2140 DeepThroat.100, DeepThroat.200, DeepThroat.310
  • TCP 2332 SilentSpy.202
  • TCP 2589 Dagger.140
  • TCP 2600 DigitalRootbeer.100
  • TCP 2989 Rat.200
  • TCP 3128 MastersParadise.970
  • TCP 3129 MastersParadise.920, MastersParadise.970
  • TCP 3150 DeepThroat.100, DeepThroat.200, DeepThroat.310, MiniBacklash.110
  • TCP 3215 BlackStar.100, Ghost.230
  • TCP 3333 Daodan.123
  • TCP 3410 OptixPro.100, OptixPro.110
  • TCP 3456 Force.155, TerrorTrojan.100
  • TCP 3505 AutoSpy.130, AutoSpy.140
  • TCP 3586 Snid.120, Snid.212
  • TCP 3700 PortalOfDoom.100
  • TCP 3723 Mantis.100
  • TCP 3800 Eclypse.100
  • TCP 3996 RemoteAnything.364
  • TCP 4000 SkyDance.220, SkyDance.229
  • TCP 4201 Wartrojan.160, Wartrojan.200
  • TCP 4225 SilentSpy.202
  • TCP 4321 Bobo.100
  • TCP 4444 AlexTrojan.200, Crackdown.100
  • TCP 4488 EventHorizon.100
  • TCP 4523 Celine.100
  • TCP 4545 InternalRevise.100, RemoteRevise.150
  • TCP 4567 FileNail.100
  • TCP 4666 Mneah.100
  • TCP 4950 ICQTrojan.100
  • TCP 5005 Aladino.060
  • TCP 5025 Keylogger.WMRemote.100
  • TCP 5031 NetMetro.104
  • TCP 5032 NetMetro.104
  • TCP 5033 NetMetro.104
  • TCP 5050 RoxRat.100
  • TCP 5151 OptixLite.020, OptixLite.030, OptixLite.040
  • TCP 5190 MBomber.100
  • TCP 5277 WinShell.400
  • TCP 5343 WCRat.100
  • TCP 5400 BackConstruction.120, BackConstruction.150, BladeRunner.080, DeepThroat.300
  • TCP 5401 BackConstruction.120, BackConstruction.150, BackConstruction.210, BackConstruction.250, BladeRunner.080, DeepThroat.300, Mneah.100
  • TCP 5402 BackConstruction.210, BackConstruction.250, BladeRunner.080, DeepThroat.300, Mneah.100
  • TCP 5534 TheFlu.100
  • TCP 5550 XTCP.200, XTCP.201
  • TCP 5555 Noxcape.100, Noxcape.200
  • TCP 5695 Assassin.100
  • TCP 5714 WinCrash.100
  • TCP 5741 WinCrash.100
  • TCP 5742 WinCrash.103
  • TCP 5802 Y3KRat.160
  • TCP 5810 Y3KRat.160
  • TCP 5838 Y3KRat.170
  • TCP 5858 Y3KRat.110, Y3KRat.120, Y3KRat.140
  • TCP 5880 Y3KRat.140
  • TCP 5881 Y3KRat.110, Y3KRat.120, Y3KRat.140
  • TCP 5882 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150
  • TCP 5883 Y3KRat.110, Y3KRat.140
  • TCP 5884 Y3KRat.140, Y3KRat.150
  • TCP 5885 Y3KRat.110, Y3KRat.120, Y3KRat.140
  • TCP 5886 Y3KRat.120, Y3KRat.140
  • TCP 5887 Y3KRat.110, Y3KRat.120, Y3KRat.140
  • TCP 5888 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150
  • TCP 5889 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150
  • TCP 5890 Y3KRat.140
  • TCP 6400 Thething.100, Thething.150
  • TCP 6556 AutoSpy.120, AutoSpy.122
  • TCP 6655 Aqua.020
  • TCP 6660 LameSpy.095
  • TCP 6666 LameRemote.100, ProjectMayhem.100
  • TCP 6669 Vampire.100
  • TCP 6670 DeepThroat.200, DeepThroat.210
  • TCP 6671 DeepThroat.310
  • TCP 6699 HostControl.101
  • TCP 6711 DeepThroat.300, Noknok.820, SubSeven.180, SubSeven.190
  • TCP 6712 Subseven.100
  • TCP 6713 Subseven.100
  • TCP 6767 NTRC.120
  • TCP 6776 SubSeven.180, SubSeven.190, Subseven.200
  • TCP 6789 Doly.200
  • TCP 6796 SubSeven.214
  • TCP 6912 ShitHeep.100
  • TCP 6939 Indoctrination.100
  • TCP 6953 Lithium.100
  • TCP 6969 2000Cracks.100, Bigorna.100, Danton.110, Danton.210, Danton.220, Danton.310, Danton.320, Danton.330, GateCrasher.110, NetController.108, Sparta.110, VagrNocker.120
  • TCP 6970 Danton.330
  • TCP 7001 Freak88.100
  • TCP 7119 Massaker.100
  • TCP 7200 Massaker.110
  • TCP 7300 Coced.221
  • TCP 7301 Coced.221
  • TCP 7306 NetSpy.200, NetSpy.200
  • TCP 7410 Phoenix.190, Phoenix.200
  • TCP 7511 Genue.100
  • TCP 7609 Snid.120, Snid.212
  • TCP 7614 Wollf.130
  • TCP 7648 BlackStar.100, Ghost.230
  • TCP 7788 Last.2000, Matrix.200
  • TCP 7826 MiniOblivion.010, Oblivion.010
  • TCP 7887 SmallFun.110
  • TCP 7891 Revenger.100
  • TCP 7979 VagrNocker.200
  • TCP 7997 VagrNocker.200
  • TCP 8000 XConsole.100
  • TCP 8011 Way.240
  • TCP 8012 Ptakks.215, Ptakks.217
  • TCP 8110 LoseLove.100
  • TCP 8111 LoseLove.100
  • TCP 8301 LoseLove.100
  • TCP 8302 LoseLove.100
  • TCP 8372 NetBoy.100
  • TCP 8720 Connection.130
  • TCP 8734 AutoSpy.110
  • TCP 8811 Force.155
  • TCP 8899 Last.2000
  • TCP 9000 Aristotles.100
  • TCP 9301 LoseLove.100
  • TCP 9400 InCommand.100, InCommand.110, InCommand.120, InCommand.130, InCommand.140, InCommand.150, InCommand.153, InCommand.160, InCommand.167, InCommand.170
  • TCP 9401 InCommand.100, InCommand.110, InCommand.170
  • TCP 9402 InCommand.100, InCommand.110
  • TCP 9561 CRatPro.110
  • TCP 9563 CRatPro.110
  • TCP 9580 TheefLE.100
  • TCP 9696 Danton.210, Ghost.230
  • TCP 9697 Danton.320, Danton.330, Ghost.230
  • TCP 9870 R3C.100
  • TCP 9872 PortalOfDoom.100
  • TCP 9873 PortalOfDoom.100
  • TCP 9874 PortalOfDoom.100
  • TCP 9875 PortalOfDoom.100
  • TCP 9876 Rux.100, SheepGoat.100
  • TCP 9877 SmallBigBrother.020
  • TCP 9878 SmallBigBrother.020, TransmissionScout.100, TransmissionScout.110, TransmissionScout.120
  • TCP 9879 SmallBigBrother.020
  • TCP 9999 ForcedEntry.100, Infra.100, Prayer.120, Prayer.130, TakeOver.200, TakeOver.300
  • TCP 10001 DTr.130, DTr.140
  • TCP 10013 Amanda.200
  • TCP 10067 PortalOfDoom.100
  • TCP 10100 Gift.240
  • TCP 10101 NewSilencer.100
  • TCP 10167 PortalOfDoom.100
  • TCP 10528 HostControl.100, HostControl.260
  • TCP 10607 Coma.109
  • TCP 10666 Ambush.100
  • TCP 11011 Amanda.200
  • TCP 11050 HostControl.101
  • TCP 11051 HostControl.100, HostControl.260
  • TCP 11223 AntiNuke.100, Progenic.100, Progenic.110
  • TCP 11225 Cyn.100, Cyn.103, Cyn.120
  • TCP 11306 Noknok.800, Noknok.820
  • TCP 11831 Katux.200, Latinus.140, Latinus.150, Pest.100, Pest.400
  • TCP 11991 PitfallSurprise.100
  • TCP 12043 Frenzy.2000
  • TCP 12345 Fade.100, Netbus.160, Netbus.170, VagrNocker.400
  • TCP 12346 Netbus.160, Netbus.170
  • TCP 12348 Bionet.210, Bionet.261, Bionet.280, Bionet.302, Bionet.305, Bionet.311, Bionet.313, Bionet.316, Bionet.317
  • TCP 12349 Bionet.084, Bionet.261, Bionet.280, Bionet.302, Bionet.305, Bionet.311, Bionet.313, Bionet.314, Bionet.316, Bionet.317, Bionet.401, Bionet.402
  • TCP 12389 KheSanh.210
  • TCP 12478 Bionet.210
  • TCP 12623 Buttman.090, Buttman.100
  • TCP 12624 Buttman.090, Buttman.100
  • TCP 12625 Buttman.100
  • TCP 12904 Akropolis.100, Rocks.100
  • TCP 13473 Chupacabra.100
  • TCP 13753 AFTP.010
  • TCP 14100 Eurosol.100
  • TCP 14194 CyberSpy.840
  • TCP 14286 HellDriver.100
  • TCP 14500 PCInvader.050, PCInvader.060, PCInvader.070
  • TCP 14501 PCInvader.060, PCInvader.070
  • TCP 14502 PCInvader.050, PCInvader.060, PCInvader.070
  • TCP 14503 PCInvader.050, PCInvader.060, PCInvader.070
  • TCP 14504 PCInvader.050, PCInvader.060
  • TCP 15092 HostControl.100, HostControl.260
  • TCP 15382 SubZero.100
  • TCP 15432 Cyn.210
  • TCP 15555 ICMIBC.100
  • TCP 16322 LastDoor.100
  • TCP 16484 MoSucker.110
  • TCP 16661 Dfch.010
  • TCP 16969 Progenic.100
  • TCP 16982 AcidShiver.100
  • TCP 17300 Kuang.200
  • TCP 17499 CrazzyNet.370, CrazzyNet.375, CrazzyNet.521
  • TCP 17500 CrazzyNet.370, CrazzyNet.375, CrazzyNet.521
  • TCP 17569 Infector.141, Infector.160, Infector.170, Infector.180, Infector.190, Infector.200, Intruder.100, Intruder.100
  • TCP 17593 AudioDoor.120
  • TCP 19191 BlueFire.035, BlueFire.041
  • TCP 19604 Metal.270
  • TCP 19605 Metal.270
  • TCP 19991 Dfch.010
  • TCP 20000 Millenium.100
  • TCP 20001 Millenium.100, PshychoFiles.180
  • TCP 20002 AcidKor.100, PshychoFiles.180
  • TCP 20005 MoSucker.200, MoSucker.210, MoSucker.220
  • TCP 21212 Schwindler.182
  • TCP 21554 Exploiter.100, Exploiter.110, Girlfriend.130, GirlFriend.135
  • TCP 21579 Breach.2001
  • TCP 21584 Breach.2001
  • TCP 21684 Intruse.134
  • TCP 22068 AcidShiver.110
  • TCP 22115 Cyn.120
  • TCP 22222 Prosiak.047, Ruler.141, Rux.300, Rux.400, Rux.500, Rux.600
  • TCP 22223 Rux.400, Rux.500, Rux.600
  • TCP 22456 Bla.200, Bla.503
  • TCP 22457 AcidShiver.120, Bla.200, Bla.503
  • TCP 22784 Intruzzo.110
  • TCP 22845 Breach.450
  • TCP 22847 Breach.450
  • TCP 23005 Infinaeon.110, NetTrash.100, Oxon.110, WinRat.100
  • TCP 23006 Infinaeon.110, NetTrash.100, Oxon.110, WinRat.100
  • TCP 23032 Amanda.200
  • TCP 23432 Asylum.010, Asylum.012, Asylum.013, Asylum.014, MiniAsylum.110
  • TCP 23456 EvilFTP.100, VagrNocker.400
  • TCP 23476 DonaldDick.153, DonaldDick.154, DonaldDick.155
  • TCP 23477 DonaldDick.153
  • TCP 24000 Infector.170
  • TCP 24307 Wildek.020
  • TCP 25386 MoonPie.220
  • TCP 25486 MoonPie.220
  • TCP 25555 FreddyK.100, FreddyK.200
  • TCP 25556 FreddyK.100
  • TCP 25685 MoonPie.010, MoonPie.012, MoonPie.130, MoonPie.220, MoonPie.240, MoonPie.400
  • TCP 25686 MoonPie.135, MoonPie.200, MoonPie.400
  • TCP 25982 MoonPie.135, MoonPie.200
  • TCP 26274 Delta.050
  • TCP 27160 MoonPie.135, MoonPie.200
  • TCP 27184 Alvgus.100, Alvgus.800
  • TCP 27374 Muerte.110, Subseven.210, SubSeven.213
  • TCP 28429 Hack'a'Tack.2000
  • TCP 28430 Hack'a'Tack.2000
  • TCP 28431 Hack'a'Tack.2000
  • TCP 28432 Hack'a'Tack.2000
  • TCP 28433 Hack'a'Tack.2000
  • TCP 28434 Hack'a'Tack.2000
  • TCP 28435 Hack'a'Tack.2000
  • TCP 28436 Hack'a'Tack.2000
  • TCP 29559 DuckToy.100, DuckToy.101, Katux.200, Latinus.140, Latinus.150, Pest.100, Pest.400
  • TCP 29891 Unexplained.100
  • TCP 30000 Infector.170
  • TCP 30001 Error32.100
  • TCP 30003 LamersDeath.100
  • TCP 30029 AOLTrojan.110
  • TCP 30100 NetSphere.127, NetSphere.130, NetSphere.131
  • TCP 30101 NetSphere.127, NetSphere.130, NetSphere.131
  • TCP 30102 NetSphere.127, NetSphere.130, NetSphere.131
  • TCP 30103 NetSphere.131
  • TCP 30947 Intruse.134
  • TCP 31320 LittleWitch.400, LittleWitch.420
  • TCP 31337 BackOrifice.120, Khaled.100, OPC.200
  • TCP 31415 Lithium.101
  • TCP 31416 Lithium.100, Lithium.101
  • TCP 31557 Xanadu.110
  • TCP 31631 CleptoManicos.100
  • TCP 31745 Buschtrommel.100, Buschtrommel.122
  • TCP 31785 Hack'a'Tack.100, Hack'a'Tack.112
  • TCP 31787 Hack'a'Tack.100, Hack'a'Tack.112
  • TCP 31789 Hack'a'Tack.100, Hack'a'Tack.112
  • TCP 31791 Hack'a'Tack.100, Hack'a'Tack.112
  • TCP 31887 BDDT.100
  • TCP 31889 BDDT.100
  • TCP 32100 ProjectNext.053
  • TCP 32418 AcidBattery.100
  • TCP 32791 Akropolis.100, Rocks.100
  • TCP 33291 RemoteHak.001
  • TCP 33333 Blackharaz.100, Prosiak.047, SubSeven.214
  • TCP 33577 SonOfPsychward.020
  • TCP 34324 TelnetServer.100
  • TCP 34763 Infector.180, Infector.190, Infector.200
  • TCP 35000 Infector.190, Infector.200
  • TCP 35600 Subsari.140
  • TCP 36794 BugBear.100
  • TCP 37237 Mantis.020
  • TCP 37651 YAT.210
  • TCP 37653 YAT.310
  • TCP 40308 Subsari.140
  • TCP 40412 TheSpy.100
  • TCP 40421 MastersParadise.970
  • TCP 40422 MastersParadise.970
  • TCP 40999 DiemsMutter.110, DiemsMutter.140
  • TCP 41626 Shah.100
  • TCP 44444 Prosiak.070
  • TCP 45673 Akropolis.100, Rocks.100
  • TCP 47262 Delta.050
  • TCP 48006 Fragglerock.200
  • TCP 49683 HolzPferd.210
  • TCP 50000 Infector.180
  • TCP 50130 Enterprise.100
  • TCP 50766 Fore.100
  • TCP 51234 Cyn.210
  • TCP 51966 Cafeini.080, Cafeini.110
  • TCP 54321 PCInvader.010
  • TCP 57341 NetRaider.100
  • TCP 57922 Bionet.084
  • TCP 58008 Tron.100
  • TCP 58009 Tron.100
  • TCP 59090 AcidReign.200
  • TCP 59211 DuckToy.100, DuckToy.101
  • TCP 59345 NewFuture.100
  • TCP 60000 DeepThroat.300, MiniBacklash.100, MiniBacklash.101, MiniBacklash.101
  • TCP 60411 Connection.100, Connection.130
  • TCP 60412 Connection.130
  • TCP 60552 RoxRat.100
  • TCP 63536 InsaneNetwork.500
  • TCP 63878 AphexFTP.100
  • TCP 63879 AphexFTP.100
  • TCP 64969 Lithium.100
  • TCP 65000 Socket.100
  • UDP 1 SocketsDeTroie.250
  • UDP 666 Bla.200, Bla.400, Bla.503, Noknok.820
  • UDP 1130 Noknok.800, Noknok.820
  • UDP 2140 DeepThroat.100, DeepThroat.200, DeepThroat.310
  • UDP 2989 Rat.200
  • UDP 3128 MastersParadise.970
  • UDP 3129 MastersParadise.920, MastersParadise.970
  • UDP 3150 DeepThroat.100, DeepThroat.200, DeepThroat.310, MiniBacklash.110
  • UDP 3333 Daodan.123
  • UDP 3800 Eclypse.100
  • UDP 3996 RemoteAnything.364
  • UDP 4000 RemoteAnything.364
  • UDP 5555 Daodan.123
  • UDP 5881 Y3KRat.110, Y3KRat.140
  • UDP 5882 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150
  • UDP 5883 Y3KRat.110, Y3KRat.140
  • UDP 5884 Y3KRat.140, Y3KRat.150
  • UDP 5885 Y3KRat.110, Y3KRat.120, Y3KRat.140
  • UDP 5886 Y3KRat.120, Y3KRat.140
  • UDP 5887 Y3KRat.110, Y3KRat.120, Y3KRat.140
  • UDP 5888 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.150
  • UDP 6953 Lithium.100
  • UDP 8012 Ptakks.217
  • UDP 10067 PortalOfDoom.100
  • UDP 10167 PortalOfDoom.100
  • UDP 10666 Ambush.100
  • UDP 11225 Cyn.100, Cyn.103, Cyn.120
  • UDP 11306 Noknok.800, Noknok.820
  • UDP 12389 KheSanh.210
  • UDP 12623 Buttman.090, Buttman.100
  • UDP 12625 Buttman.100
  • UDP 14100 Eurosol.100
  • UDP 23476 DonaldDick.155
  • UDP 26274 Delta.050
  • UDP 27184 Alvgus.100
  • UDP 28431 Hack'a'Tack.2000
  • UDP 28432 Hack'a'Tack.2000
  • UDP 28433 Hack'a'Tack.2000
  • UDP 28434 Hack'a'Tack.2000
  • UDP 28435 Hack'a'Tack.2000
  • UDP 28436 Hack'a'Tack.2000
  • UDP 29891 Unexplained.100
  • UDP 30103 NetSphere.131
  • UDP 31320 LittleWitch.400, LittleWitch.420
  • UDP 31337 BackOrifice.120, OPC.200
  • UDP 31416 Lithium.100, Lithium.101
  • UDP 31789 Hack'a'Tack.100, Hack'a'Tack.112
  • UDP 31791 Hack'a'Tack.100, Hack'a'Tack.112
  • UDP 33333 Blackharaz.100
  • UDP 47262 Delta.050
  • UDP 49683 HolzPferd.210
  • UDP 60000 MiniBacklash.100


Online Virus Scanners



There are times when you do not want to download anti-virus software. These may include:


  • Your computer is too infected or broken to install new software
  • You are on someone elses computer and you don't want to install software
  • You just need to do a quick check, without the hassle of software installation
The solution for virus scanning at those times is to utilize an online virus scanner.
Note: Most online virus scanners require Internet Explorer with ActiveX enabled.

Trend Micro Housecall

Trend Micro HouseCall thoroughly scans your computer for viruses, spyware, and known security vulnerabilities. This free service is designed to demonstrate the power of Trend Micro technologies in a fast and easy solution.

BitDefender Online Scanner

BitDefender Online Scanner is a fully functional antivirus product. It features all required elements for thorough antivirus scanning and effective cleaning: it scans your system's memory, all files, folders and drives' boot sectors, providing you with the option to automatically clean the infected files.

Freedom Online Virus Check

Freedom Online Virus Check is a free online anti-virus scanner for web users. Freedom Online Virus Check allows you to scan your hard drives, diskettes, CD-ROMs, network drives, directories, and specific files for any hidden viruses, Trojans or worms. Freedom Online Virus Check uses state-of-the-art technology to scan your PC for all types of viruses.

McAfee FreeScan

McAfee FreeScan helps you detect thousands of viruses on your computer. Based on the award-winning McAfee VirusScan engine, FreeScan searches for viruses, including the latest known "in the wild" viruses, and displays a detailed list of any infected files. Should viruses be found, FreeScan even provides links to more information about the viruses and what you can do to clean your system.

Panda Active Scan

  • Antivirus - Antivirus detects and eliminates all types of viruses, worms and Trojans.
  • Antispyware Deep anti-spyware scan detects spyware that other security suites can