Blog

This blog is aimed at giving general information to our visitors regarding computer security threats. Feel free to browser through our articles for information. If you need to remove threats, we recommend trying our tool to see if the threat you wish to remove can be detected.

Trojan Viruses – Basic Manual Removal Guide

Nearly all regular computer users know about Trojan horse viruses and their effect on computers. A Trojan virus is basically…
CONTINUE READING

What are Rootkits?

Originally used in the 1990s to target UNIX operating systems, a rootkit is a special type of malicious software that…
CONTINUE READING

What are Hacktools and How to Remove Them

Hacktool viruses are tools specially designed and used by hackers (or unauthorized users) to spread malicious Trojans, worms, siffers and…
CONTINUE READING

What Are Exploits And How to Remove Them

Currently ranked as 48th in the world of online malware, an exploit is malicious software that commands to ‘exploit’ any…
CONTINUE READING

What Are Keylogger Viruses & How to Remove Them

A Keylogger is defined as software that monitors and logs every keystroke on your computer. A Keylogger virus is basically…
CONTINUE READING

What are Computer Worms

Worms are a type of self-replicating computer virus that are similar to viruses in design and are considered to be…
CONTINUE READING