- In computing, a
trojan horse (or
simply trojan;
often capitalized, but see below) is a kind of
malware that
misleads users as to its true
intent by disguising...
- A key
generator (key-gen) is a
computer program that
generates a
product licensing key, such as a
serial number,
necessary to
activate for use of a software...
- (specific variant) (McAfee)
Troj/Dorf and Mal/Dorf (Sophos) Trojan.DL.Tibs.Gen!Pac13 Trojan.Downloader-647 Trojan.Peacomm (Symantec)
TROJ_SMALL.EDW (Trend Micro)...
-
threat description -
Microsoft Security Intelligence". www.microsoft.com. "
TROJ_ETEROCK.A -
Threat Encyclopedia -
Trend Micro USA". www.trendmicro.com. "Win32/Exploit...
- four pillars),
cabaceiras (Galician
round basketwork hórreo),
trojes or
trojs in
Castile or silos.
Panera in Luanco,
Asturias A
Galician hórreo. Hórreo...
- h GPCoder.i
Trend Micro:
TROJ_PGPCODER.A
TROJ_PGPCODER.B
TROJ_PGPCODER.C
TROJ_PGPCODER.D
TROJ_PGPCODER.E
TROJ_PGPCODER.F
TROJ_PGPCODER.G ThreatExpert...
- words, such as "trojúhelník" triangle,
which is
composed of two words: "
troj",
which is
derived from "tři" three, and "úhel",
which means angle. If this...
-
Google searches, and then
installs rogue security software. Also
known as
Troj/JSRedir-R this
botnet first appeared in 2009. Gumblar.X
infections were widely...
- TrojanDropper:Win32/Stuxnet By
Symantec W32.Stuxnet W32.Stuxnet!lnk By
Sophos Troj/Stuxnet-[Letter] Trojan-Dropper.Win32.Stuxnet.[Letter] Worm.Win32.Stuxnet...
-
ransomware became prominent in May 2005. By mid-2006,
Trojans such as Gpcode,
TROJ.RANSOM.A, Archiveus, Krotten, Cryzip, and
MayArchive began utilizing more...