Search Results for: malware

Trojans FAQ

We have all heard alot about trojan horse programs and the threat that they pose to your network's security. This Trojan FAQ sheds some light on what these programs are, what they do, how they can infect your network and suggests measures that could be taken to prevent such infections. You can make sure that you have a good grasp on these malicious programs by browsing through this regularly updated Trojan FAQ which provides the answers to these questions and many others. With thanks to Dancho Danchev for his contributions to this FAQ.

Hidden Backdoors, Trojan Horses and Rootkit Tools in a Windows Environment

Not every case of a successful intrusion is “crowned” with a replaced Web site on the server, data theft or damage. Often electronic intruders do not wish to create a spectacle but prefer to avoid fame by hiding their presence on compromised systems, sometimes leaving certain unexpected things. They use sophisticated techniques to install specific “malware” (backdoors) to let them in again later with full control and in secret.

Stop Virus Downloads with GFI’s DownloadSecurity

Are you tired of users downloading viruses, worms, trojans and scumware onto your network? Are you tired of conducting software audits on your workstations only to find a week later that same crud on your users desktops? If so, then you need to check out DownloadSecurity and see how it blocks users from downloading malware and viruses and puts you back in control

What You Need to Know About Intrusion Detection Systems

Firewalls and other simple boundary devices lack some degree of intelligence when it comes to observing, recognizing, and identifying attack signatures that may be present in the traffic they monitor and the log files they collect. Without sounding critical of such other systems’ capabilities, this deficiency explains why intrusion detection systems are becoming increasingly important in helping to maintain proper network security.

Scroll to Top