Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: ClearBlueSky

Once a trojan is in place on your computer, they can remotely access it and program it to do whatever they want. Send spam, launch an attack against other computers, search for anything on your computer that looks like a credit card number or userids and passwords, or watch for you to open particular web sites, like online banking sites, and record the keystrokes you enter when you log in and send them the information.


10 posted on 01/22/2009 3:09:13 PM PST by tacticalogic ("Oh bother!" said Pooh, as he chambered his last round.)
[ Post Reply | Private Reply | To 4 | View Replies ]


To: tacticalogic
Once a trojan is in place on your computer, they can remotely access it and program it to do whatever they want. Send spam, launch an attack against other computers, search for anything on your computer that looks like a credit card number

Is it true that even the best anti-virus programs are only catching around 70% of the stuff out there?

30 posted on 01/22/2009 7:17:44 PM PST by GOPJ ("A consensus of 100 scientists is undone by one fact." - - Einstein (take that Al Gore))
[ Post Reply | Private Reply | To 10 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson