Trojan

Recover from a Trojan or virus

If you know what specific malicious program has infected your computer, you can visit one of several anti-virus web sites […]

Skeleton Key Malware Analysis

Author: Dell SecureWorks Counter Threat Unit™ Threat Intelligence Date: 12 January 2015 URL: http://www.secureworks.com/cyber-threat-intelligence/threats/skeleton-key-malware-analysis/ Summary Dell SecureWorks Counter Threat Unit(TM) […]

The algorithm of the Trojan

The trojan horse which I have created appears itself as an antivirus program that scans the computer for malware programs. […]