If you have these Add-ons for Firefox, please delete them and after that make a Virus scan, because, these add-ons are very high infected.
- Sothink Web Video Downloader 4.0
- all versions of Master Filer
Good luck!
Printable View
If you have these Add-ons for Firefox, please delete them and after that make a Virus scan, because, these add-ons are very high infected.
- Sothink Web Video Downloader 4.0
- all versions of Master Filer
Good luck!
Thanks for warnings mate ! :thumbsup:
What exactly does this virus do?
Oh sh*t! I've seen one of them. I didn't click them though.
I'm scanning my PC right now. Can't risk... :? :unsure:
Virus, are basically is like germs. When you eat something (download something) the germs will get into your body (virus into your computer). Then eventually the virus will mess around with your computer, it will slow down your computer, it will corrupt stuff, it could crash your computer. Viruses aren't good things to have. When you download things on the internet always make sure they are from TRUSTED people.Quote:
Originally Posted by dalvo
Or if it's free. Everybody knows free downloads can be trusted.
Not all the time. You could be downloading a program for something, and it gives you viruses.
I'm pretty sure he was joking.
Oh no... I was tricked... I lower my guard too much...
Nope, that was not a joke, i meant it really seriously. I got this information from the officials and i wanted to let you know, too. Because, they are not so harmless as some other viruses and so on, plus, in these add-ons are not viruses, there are trojans, and thatīs a big difference to viruses. They can make more troubles than viruses.Quote:
Originally Posted by Roflcopter3399
A Trojan horse (sometimes shortened to trojan, is non-self-replicating malware that appears to perform a desirable function for the user but instead facilitates unauthorized access to the user's computer system. The term is derived from the Trojan Horse story in Greek mythology.
Trojan horses are designed to allow a hacker remote access to a target computer system. Once a Trojan horse has been installed on a target computer system, it is possible for a hacker to access it remotely and perform various operations. The operations that a hacker can perform are limited by user privileges on the target computer system and the design of the Trojan horse.
Operations that could be performed by a hacker on a target computer system include:
* Use of the machine as part of a botnet (i.e. to perform spamming or to perform Distributed Denial-of-service (DDoS) attacks)
* Data theft (e.g. passwords, credit card information, etc.)
* Installation of software (including other malware)
* Downloading or uploading of files
* Modification or deletion of files
* Keystroke logging
* Viewing the user's screen
* Wasting computer storage space
Trojan horses require interaction with a hacker to fulfill their purpose, though the hacker need not be the individual responsible for distributing the Trojan horse. In fact, it is possible for hackers to scan computers on a network using a port scanner in the hope of finding one with a Trojan horse installed, that the hacker can then use to control the target computer.
A trojan differs from a virus in that only a file specifically designed to carry it can do so.
Also Roflcopter, i would never, ever make jokes like that, have this please in remind.