A Trojan may infect any system through Trojan vectors. The most common Trojan vectors are as follows:

* Email attachments
* Social engineering
* NetBIOS remote installation
* Physical access
* Fake executables
* Spyware and adware
* IRC and IM chats
* Flash applets
* ActiveX controls, VBScript, and Java scripts

Explore More

Is your IP Leaking? Find out here

The first link shows your IP.http://www.whatismyip.com/This site will show more information like your town…http://www.geobytes.com/IpLocator.htm?GetLocationIf you pass this test your Proxys / Programs are doing their job…https://grc.com/x/ne.dll?bh0bkyd2 Privacy Check – checks

Windows rootkits 101

When administrators and security professionals hear the word rootkit, most think first of a UNIX-based system. Unfortunately, this only leads to a false sense of security for Windows-based systems. The

critical SQL injection (vulnerability) on Myanmar Online Advertisement

PlanetCreator.Net’s Security Team member $@T0R! reported another critical SQL injection (vulnerability) on Myanmar Online Advertisement URL : http://www.myanmaradv.com/ SQL injection is a code injection technique that exploits a security vulnerability