Trojan & Worm Ports Information Center
Last Updated: Thursday, November 06, 2008
|Programs (applications) which are
internet-aware use 'ports' to establish communication. The trouble
is, so do BAD computer programs, such as these known trojans.
The resources below will help you to identify malicious programs and strange 'processes' running on your computer. Tools on our Spyware Removal Page will help you locate/remove any such programs.
I've moved the Trojan Ports list so it appears on it's own page. I felt it would make navigating the information below (which was on the previous trojan ports page) much easier to find.
|Zombies are computers which have been infected with a program that lets an intruder control the computer. Such control can be the cause for thousands of computers to jointly attack a single computer or network.|
|DoShelp's Trojan Ports List||Common Application Ports|
|Ports Search page||Ports used on Spoof Sites|
|Microsoft Port designations||Aplication Ports|
|Portsdb.org||Finding Trojans in the Registry|
|Moosoft Trojan Database||What is this Program?|
|Trojan TCP/IP Ports||Securing Windows against Trojans|
|Firewalls what they cannot do||A very informative site|
|Vmyths.com - Truth on Viruses||Mass-Mailing Worms|
|Trojan Killer Software||Complete Ports List|
Trojan & Spyware Information Publications
|This is the Swiss Army Knife of Internet Tools! It helps me With all my internet Investigations. Check The Features out!|
Helpful Links & Information