home page
what is a trojan ?
Adware ? Spyware ? Trojan ? Virus ?
Protection and Control
Have I Got a Trojan ?
Trojan Removal
Phishing scams
Why target me ?
10 simple anti-trojan rules
Frequently Asked Questions
Technical Assistance Forums
Software Reviews
Rogue Software
Software Downloads
Internet Security Sites
Link to us
Other Helpful Stuff
Recommended Reading
Trojan Archives
Trojan Port List
Contact us

I'm not concerned about all hell breaking loose, but that a PART of hell will break loose... it'll be much harder to detect.

George Carlin
US comedian and actor (1937 - 2008)

sourced from

Recommended Product

Digital Patrol finds 100% of all tojan programs in-the-wild, and finds and deletes computer viruses in your computer hard drive and memory.

Featured Site Link

Malware Complaints
A site that was started by anti-malware fighters as a place where you, a victim, can register your feelings about the malware writers that have made your life a misery.

Have I got a Trojan ?

Signs your Computer may be infected.

There are various clues that your machine may be infected. Here are some of the most common:

These are the most common indicators. So if some of the items on the list above refer to you then there is a good chance that your machine may be infected by some kind of malware. Trojans, spyware and adware are parasite programs that will steal your system resources with the potential security risk to you ranging from intrusive and annoying to downright dangerous.

To find out what is on your computer you will need to do a diagnostic check.

Detection Tools you will need

For the next part of this operation you will need to download and install certain software on your computer, if you do not already have it. You can follow the links from the Software Downloads page, but for expediency, we will note the essentials here.

  1. You will need a system monitor such as Windows Task Manager (alt-ctrl-del) freeware, or TaskInfo2003, or Deep System Explorer commercial ware.

  2. You will need an up to date Firewall/Trojan and Virus Scanner. There are many to choose from. Most companies that have a commercialware version of firewalls and scanners also have a functioning free version for home or non-commercial users, with some exceptions. (see our Software Reviews page.)

    Before you download anything though, you also need to know that some software that claims to remove malware is actually malware itself. Check the unsafe list first. Rogue Software

  3. A start-up Program Manager such as Starter by Lion Codestuff

System Checkup

  1. Shut down the system. Restart

  2. Open Starter by Lion Codestuff ( instructions on where to get this program are on the software downloads page ).

  3. Identify the programs that are scheduled to open at startup. If there are any in the lineup that you are unsure what they are, take a note of the names, and search online to identify them. (You may also decide that some of the legitimate programs in the list do not need to open at startup and can be unchecked. This will speed up your startup procedure time. You will still be able to access these programs from your desktop icon or start menu.)

  4. Run a Process Monitor program such as TaskInfo2003

  5. Connect to the internet.

  6. Have a look at what programmes are running. Note any that you know are OK. Any you think are suspicious, or don't know what they are can be identified using the Uniblue Process Library, or

  7. Using one of the following file scanning programs (Malwarebytes Anti-Malware, or a-squared Anti-Malware, or Housecall by Trend Micro) scan the files on your hard drive to detect any trojans or other malware.

  8. If you are using the online version of the scanners, then this may take a while, particularly if you are on dialup, so it will be preferable to download either a freeware or commercial ware version of a trojan scanner.

  9. Once the scan is complete you will get a report window that will highlight the presence of any known trojan or other security threat present on your system.

  10. These will be put into a quarantine folder. The purpose for this is so that they can no longer damage your system while you decide how to handle them, because the trojan may be embedded in a file which is critical to the operation of one or more programs. Therefore, merely deleting the trojan may cause harm to your system.

Now if you have detected anything malicious and it is safely quarantined you will need to investigate it and remove it without doing any damage to any of the useful programs that the nasty may have been hiding in. TROJAN REMOVAL