home page
what is a trojan ?
Adware ? Spyware ? Trojan ? Virus ?
Protection and Control
Have I Got a Trojan ?
Trojan Removal
Phishing scams
Why target me ?
10 simple anti-trojan rules
Frequently Asked Questions
Technical Assistance Forums
Software Reviews
Rogue Software
Software Downloads
Internet Security Sites
Link to us
Other Helpful Stuff
Recommended Reading
Trojan Archives
Trojan Port List
Contact us

Featured Site Link
For excellent
technical support




Why would anyone want to hack my computer ?


It may be tempting to think that because you do not have secret documents on your computer or because your online interests are so boring, no one could possibly be interested in what you are up to. However it is not safe to assume that you have nothing of interest to a hacker. Your computer will most probably hold many pieces of a puzzle that once put together can put at risk something that is extremely valuable; your identity.

Identity theft is on the increase and most of us wouldn't realize what a nightmare scenario that someone stealing your identity can be unless it has happened to you or someone you know. At risk is your money via credit cards and bank accounts, your credit rating and reputation and maybe your sanity as you try to regain control of your identity/life!

These are a few things you be extra vigilant about.

Password stealing is a key method in online identity theft but not the only one. Also of interest to internet thieves is other personal details and data


Almost anything can be purchased online from just about any country to just about any country. If a thief manages to gain control of your payment mechanism, the possibilities for them are enormous, and can only be detrimental to you.

Credit Card usage

Every time you use your credit card on line you are giving the site that you are buying from a lot of potentially dangerous information if it were to be used fraudulently. If you have not purchased from them before, at least make sure you know with a high degree of certainty their security is tight. Hackers are very interested in credit card numbers and internet payment accounts such as paypal etc. Many warez groups will use a stolen credit card number to purchase software then distribute the stolen software key to others online. Trojan makers are slowly moving away from coding malware for free and are moving into the arena of making malware for profits.

Use secure sites and trusted vendors. Look for https, (which represents a secure http site), the small padlock down the bottom right hand corner of your browser, and/or a "secured by" logo, such as SSL COMODO.

Check privacy Policy about storage of credit card details and use of information about yourself that you could potentially provide. It sometimes really pays to read through licence agreements and privacy policies.

Consider setting up a secure payment account, such as through Paypal.


Broadband technology has given hackers more scope when it comes to bandwidth theft. A hacker can set up an ftp server on an infected victims system and upload a heap of pirated software then publish the address around the internet. These warez dumps and pubstros as they are known can cost an victim in bandwidth.
Process manager, Startup manager, Firewall, Malware scanner.


Even dial up accounts are valuable to hackers. A hacker can steal the login details from a victim and use the victims account to hack other people. The victim will often get blamed for these attacks as they seemingly come from their computer. Distributed denial of service attacks require the hacker to control a vast amount of machines. If the hacker has control of your machine, they can use it as a zombie to attack corporate sites and government computers. Victims can even be taken to court in some countries if they fail to provide security measures and their computer is used in an attack.