Schedule an appointment with 3 Geeks and a Mouse
Have a question about 3 Geeks and a Mouse? Ask here.

Do you have a Virus?
Are you infested with pop-up ads, new toolbars in your browser, is your home page changed or are you bombarded with irritating spam? Perhaps your computer is running very slow or worst, you can't get on the internet. If so, your PC is most likely infected with adware, anti adware, spyware, spybot, trojans, viruses or another internet parasite. Viruses won't go away anytime soon! More than 60,000 viruses have been identified, and new viruses are created every day, according to the International Computer Security Association. 

What is a Trojan?
A Trojan is malware that performs unexpected or unauthorized, often malicious, actions. The main difference between a Trojan and a virus is the inability to replicate. Trojans cause damage, unexpected system behavior, and compromise the security of systems, but do not replicate. If it replicates, then it should be classified as a virus.  A Trojan, coined from Greek mythology's Trojan horse, typically comes in good packaging but has some hidden malicious intent within its code. When a Trojan is executed users will likely experience unwanted system problems in operation, and sometimes loss of valuable data.

What is a Virus?
A computer virus is a program of executable code that has the ability to replicate. Like biological viruses, computer viruses can spread quickly and are often difficult to eradicate. They can attach themselves to just about any type of file and are spread as files that are copied and sent from individual to individual. Some computer viruses can also destroy files, reformat your hard drive, or cause other damage. If the virus does not contain a damage routine, it can cause trouble by consuming storage space and memory, and degrading the overall performance and resources of your computer. Several years ago most viruses spread primarily via floppy disk, but the Internet has introduced new virus distribution mechanisms. With email now used as an essential business communication tool, viruses are spreading faster than ever. Viruses attached to email messages can infect an network or your computer in minutes, costing companies millions of dollars annually in lost productivity and virus extraction expenses.

What is Malware?
Malware, short for malicious software, refers to any malicious or unexpected program or code such as viruses, and trojans.  What is Spyware? Spyware is short for advertising supported software (Adware). Software that sends information about your internet habits back to the computer from which it's launched. Spyware is often built into free downloads and works in the background without a user's knowledge .Since it doesn't record an individual's personal information, it's often used to create marketing profiles based on surfing habits.  Why is it called "Spyware"? While this may be a great concept, the downside is that the advertising companies also install additional tracking software on your system, which is continuously sending your tracking information over the internet. While according to the privacy policies of the companies, there will be no sensitive or identifying data collected from your system and you shall remain anonymous, it still remains the fact, that you have a "live" server sitting on your PC that is sending information about you and your surfing habits to a remote location.

What is a Wabbit?
Wabbit's are rare. Oddly enough they don't do much unless it's on your computer. They don't try to spread to other computers, but they can be devastating to your computer. What is a Backdoor? Backdoors are a lot like Trojans and worms, except they open a backdoor to your computer allowing hackers into your computer to load viruses or to send spam through your computer.

What is a Rootkit?
A Rootkit is the hardest virus to detect. It is designed to hide in the computers core processes making it difficult to detect. It often requires a complete wiping of the hard drive and reinstalling the original operating system. What is a Dialer? Dialers can be costly. A black hat hacker can use a dialer to dial those expensive telephone numbers in small countries or to transmit stolen data.

What are Exploits?
Exploits are what keeps Bill Gates and Microsoft up late at night. Hackers try to find flaws in Windows to bypass security so they can get access to your computer. Service Pact 2 is an example of a patch that is used to correct a flaw in Windows. Is Spyware illegal? Even though the name may indicate so, spyware is not an illegal type of software in any way. However there are certain issues that a privacy oriented user may object to and therefore prefer not to use the product. This usually involves the tracking and sending of data and statistics via a server installed on the user's PC and the use of your Internet connection in the background. These tools are perfectly legal in most places, but, just like an ordinary tape recorder, if they are abused, they can seriously violate your privacy.

What's the hype about?
While legitimate adware companies will disclose the nature of data that is collected and transmitted in their privacy statement, there is almost no way for the user to actually control what data is being sent. The fact is that the technology is in theory capable of sending much more than just banner statistics - and this is why many people feel uncomfortable with the idea. When was the last time you read a privacy statement on a web site? Millions of people are using advertising supported "spyware" products and could not care less about the privacy hype, in fact some "Spyware" programs are among the most popular downloads on the Internet. Spyware is often bundled with free software and games. There are also many PC surveillance tools that allow the user to monitor all kinds of activity on a computer, ranging from keystroke capture, keyloggers, snapshots, email logging, chat logging and just about everything else. These tools are often designed for parents, businesses and similar environments, but can be easily abused if they are installed on your computer without your knowledge.

Alabama ( AL ) Virus, Trojan horse, worm and spyware removal
Alaska ( AK ) Virus, Trojan horse, worm and spyware removal
Arizona ( AZ ) Virus, Trojan horse, worm and spyware removal
Arkansas ( AR ) Virus, Trojan horse, worm and spyware removal
California ( CA ) Virus, Trojan horse, worm and spyware removal
Colorado ( CO ) Virus, Trojan horse, worm and spyware removal
Connecticut ( CT ) Virus, Trojan horse, worm and spyware removal
Delaware ( DE ) Virus, Trojan horse,worm and spyware removal
District of Columbia ( DC ) Virus, Trojan horse, worm and spyware removal
Florida ( FL ) Virus, Trojan horse, worm and spyware removal
Georgia ( GA ) Virus, Trojan horse,worm and spyware removal
Hawaii ( HI ) Virus, Trojan horse, worm and spyware removal
Idaho ( ID ) Virus, Trojan horse, worm and spyware removal
Illinois ( IL ) Virus, Trojan horse, worm and spyware removal
Indiana ( IN ) Virus, Trojan horse, worm and spyware removal
Iowa ( IA ) Virus, Trojan horse, worm and spyware removal
Kansas ( KS ) Virus, Trojan horse, worm and spyware removal
Kentucky ( KY ) Virus, Trojan horse, worm and spyware removal
Louisiana ( LA ) Virus, Trojan horse, worm and spyware removal
Maine ( ME ) Virus, Trojan horse, worm and spyware removal
Maryland ( MD ) Virus, Trojan horse, worm and spyware removal
Massachusetts ( MA ) Virus, Trojan horse, worm and spyware removal
Michigan ( MI ) Virus, Trojan horse, worm and spyware removal
Minnesota ( MN ) Virus, Trojan horse, worm and spyware removal
Mississippi ( MS ) Virus, Trojan horse, worm and spyware removal
Missouri ( MO ) Virus, Trojan horse, worm and spyware removal
Montana ( MT ) Virus, Trojan horse, worm and spyware removal
Nebraska ( MT ) Virus, Trojan horse, worm and spyware removal
Nevada ( NV ) Virus, Trojan horse, worm and spyware removal
New Hampshire ( NH ) Virus, Trojan horse, worm and spyware removal
New Jersey ( NJ ) Virus, Trojan horse, worm and spyware removal
New Mexico ( NM ) Virus, Trojan horse, worm and spyware removal
New York ( NY ) Virus, Trojan horse, worm and spyware removal
North Carolina ( NC ) Virus, Trojan horse, worm and spyware removal
North Dakota ( ND ) Virus, Trojan horse, worm and spyware removal
Ohio ( OH ) Virus, Trojan horse, worm and spyware removal
Oklahoma ( OK ) Virus, Trojan horse, worm and spyware removal
Oregon ( OR ) Virus, Trojan horse, worm and spyware removal
Pennsylvania ( PA ) Virus, Trojan horse, worm and spyware removal
Rhode Island ( RI ) Virus, Trojan horse, worm and spyware removal
South Carolina ( SC ) Virus, Trojan horse, worm and spyware removal
South Dakota ( SD ) Virus, Trojan horse, worm and spyware removal
Tennessee ( TN ) Virus, Trojan horse, worm and spyware removal
Texas ( TX ) Virus, Trojan horse, worm and spyware removal
Utah ( UT ) Virus, Trojan horse, worm and spyware removal
Vermont ( UT ) Virus, Trojan horse, worm and spyware removal
Virginia ( VA ) Virus, Trojan horse, worm and spyware removal
Washington ( WA ) Virus, Trojan horse, worm and spyware removal
West Virginia ( WV ) Virus, Trojan horse, worm and spyware removal
Wisconsin ( WI ) Virus, Trojan horse, worm and spyware removal
Wyoming (WY ) Virus, Trojan horse, worm and spyware removal
Washington DC ( DC ) Virus, Trojan horse, worm and spyware removal

!0000 Email Hoax
123 Messanger Adware TrojanDownloader.Win32.Perfiler, msa64chk.dll, msapasrc.dll
180SearchAssistant Alais 180Solutions, delivers advertisements on your PC
180Solutions, Adware.180Solutions, ClientAX.dll, Saishook.dll, saaphook, 180 Solutions
48 Hours Email Hoax
888bar is a toolbar Internet Explorer, IE providing shortcuts web sites & gaming web sites
A and A Virus, A A Virus, A_and_A Virus, AA Virus
A-403 Virus, A403 Virus, 403 Forbidden error on Google,
Abraxas Virus, Abraxas5 is a file infector
Ace-? Mobile Phone Email Hoax
Acid Virus, Acid.674, Program too big to fit in memory, By: Copyfright Corp-$MZU
Acme Virus, variant of Clonewar, effects EXE files
Actifed Virus is a computer virus using a G2 virus creation tool by Phalcon Skism
ActiveX, Developed my Microsoft, is a component object model, use COM runtime
ActiveX control grants a higher level on control, Simple OLE object
ADA Virus gains control of your email and sends out emails with virus attachments hoaxes, etc
Administration Tool RAT, backdoor.RAT, Uses Process Monitor, AATools, remote access
Advertising Display Software advertising to a targeted audiences, ADS
Advertising supported software spyware, adware, Ad Ware
Adssite Toolbar, Ads site Tookbar, Adssite Browser Optimzer, malware infection, Gaming
Adware, Ad Ware, advertising supported software, Banner ads while the program is running
Adware.OneStep, Win32.adware.onestep, popups or banners, does not spread automatically
Adware.FakeAntiVirus.K, Adware.FakeAntiVirus.L, Adware.fakeAntiVirus.M Fake Anti
Agenda Virus, Dark Agenda Virus, network agenda, Agenda.723, COM and EXE infector
Agent.ica Trojan Horse downloader Troj/Agent-ICA, access the internet with remote server
Agent.hsi Trojan Horse drops the file <System>\drivers\beeps.sys original beep.sys file
Ah Virus activates on Tuesdays, AKA Tuesday virus, Jerusalem.Ah, frequent hangs
AI Virus, Traveller Virus, Bagel-Ai Virus, W32.Beagle.AGmm,
AIDS Email Hoax, A.I.D.S Email Hoax virus
AIDS II Virus is a companion virus, plays a melody, "Your computer is infected with"
AIDS Trojan Virus replaces the AUTOEXEC.BAT file, AIDS Info Desk, PC Cyborg Trojan
Alias, Anti aliasing, Alias command, Aliasing
All Seeing Eye Hoax
Alternate Data Stream, Windows NTFS Alternate Data Steams provide compatibility with HFS
An intrusion attemp by securedliveclicks .com, known attack
Andre Virus, Andre2 Virus, Virus:DOS/Andyushka.3568, Andryushk.3568
Ambler AM, W32/Ambler.D, Trojan-Spy:W32/Ambler.C, Trojan-Dropper:W32/Ambler.D
Amecisco Keylogger, Keylogger keyboard, in line keylogger hardware, Invisible keylogger
America Online FlashNews Email Hoax, American Online Flash News Email Hoax
A Moment of Silence Email Hoax
Anticristo Email Hoax
A Post Card from a family member Email Hoax
AsteriskLogger, Asterick Logger
A Virtual Card For You Email Hoax
Bearshare adware, Bear share adware, peep to peer file sharing application
Antibobax-en.exe, antitest-en.exe
AntiVirus Pro 2009, AntiVirus 2009 PRO, rogue antispyware, misleading popups, Anti Virus
Anti-Debug, program to detect if it runs under control of a debugger
Anti-Debugger, IsDebuggerPresent detect or crash a particulas version of SoftICE
AntiSpywareGuard rogue anti spyware that uses misleading scans to get you to buy software

Antivirus software program that attemps to indentify, neutralize, remove malicous software

Antivirus 2008, XP Antivirus 2008, XPAntiVirus, create9 entries in your Windows Reistry
Antivirus 2009, Clone of 2008, uses Trojans like Zlob or Vundo to spread the virus
AntiVirus2008, Anti Virus 2008, AntiVirus Pro 2008
AntiVirus2009, Anti Virus 2009, AntiVirus Pro 2009
AntiVirus2010, Anti Virus 2010, AntiVirus Pro 2010
AntiVirus2011, Anti Virus 2011, AntiVirus Pro 2011Antisobig-en.exe

Antivirus Program used to identify viruses, Trojans Horses, malware, anti spyware, and worms
AntivirusPro2009, Malware Threat, Redirect web browser, antivirus2009.exe, av2009.exe
Anti Virus 2009, av2009install.exe, av2009install 0011.exe, av2009[1].exe, antivirus2009.lnk
AntiVirus PRO2009, ieupdates.exe, scui.cpl, uninstall antivirus 2009.lnk, winsrc.dll
April Fools Day Virus, Be carful opening emaisl and or attachments on that day
AOL 83 Minutes Email Hoax
AOL Instant Message Email Hoax , punter program
AOL Riot Email Hoax
AOL4Free Email Hoax or What? AOL 4 Free
ARCV Virus, Virus.DOS.ARCV.826, ARCV.826, PS-MPC (3), DOS/VKit_DA.826.gen
ARCV-FRI is a file infector

ARCV-1 Virus is a memory resident Boot virus.
ARCV-1* Virus is a memory resident Boot virus.
ARCV-2 Virus is a file infector, B
ARCV-3A, ARCV-3, ARCV3 Virus
ARCV-5 Virus is a file infector
ARCV-6 Virus is a file infector
ARCV-7 Virus Virus.DOS.ARCV.541, Univ/o, PS-MPC (3), Virus:DOS/PSMPC_541.A
ARCV-8 Virus, Virus.DOS.ARCV.679, Univ/f,, DOS/VKit_DA.679.gen
ARCV-9 Virus is a file infector
ARCV-10-1 Virus Virus.DOS.ARCV.827, ARCV.827.b PS-MPC (11)
ARCV-10-M Virus is a memory resident file infector virus.
ARCV-11 Virus Virus.DOS.ARCV.771, Univ/p, Bin.Auto.BBK, Virus:DOS/PSMPC.771
ARCV.12 Virus.Boot.Payback, BtDr.Payback, ARCV.Payback Dropper
ARCV 570 Virus Virus.DOS.ARCV.570, ARCV.Ice, X-1.570 (2) , Virus:DOS/Arcv.570
ARCV 670 Virus is a file infector
ARCV 718 Virus is a file infector
ARCV.1172 Virus, Virus.DOS.Corrupted.ARCV.1172, ARCV.dr, ARCV.Sandwich
Armouring, Java Script, Web Servers remote servers
Arusiek Virus, Arusiek.817, Trojan/Worm/Backdoor/Arusiek is a Trojan
Atak Virus AKA: Atak.A worm, Atak.B. is a mass mailing worm goes to sleep when scanned
Attack Remote Servers, Web Attack Remote Servers, Remote Tool Attacks
Attachment, Attachments, Infected attachments, virus in attachments, can open attachments
Auraax.C Worm, W32/Auraax.C.worm, Autorun.worm, infects as many computers it can
Autoencryption Auto Encryption
Automatic Download Software
AytonScape Trojan Horse, Ayton Scape Trojan Horse
Azusa Virus effects computers with VGA driver software
B Ugly Virus, UGLY.6047-B, Boot virus, Page B Virus, Ugly Spyaxe Virus
B-52 Virus, B52 Virus is a VCL generated computer virus infects .COM files
BA101 Virus, BA 101 Virus
Babath Virus, Ba Bath Virus
Baby New Year Email Hoax

Backdoor Back Door,

Backdoor Graybird P Trojan Horse
Backdoor Graybird Trojan Horse
Backdoor.Rebbew.A, Backdoor.Rebbew.B, Backdoor.Rebbew.C, Backdoor.Rebbew.D
Backdoor.Kowbot.1.2, Backdoor.Kowbot.1.3.A, Backdoor.Kowbot.1.3.B
Backdoor.Sticy.B, BackDoor.Bifrose, BackDoor.ProRat.32
Back Time Virus, backtime virus, Prague virus, Blinker virus, Shaker virus, Pizza virus, Plastic
Bad Boy Virus, BadBoy Virus, 1000.F, 1000.H, 1000.J, 1000.N, 1000.O, 1000.P
Bad Brains Virus, Virus.DOS.Leprosy.BadBrains.570, BadBrains.570, DOS/Bad_Brains.570
Bad Command or Filename, Bad Command at startup
Bad Sectors 1.2 Virus infect the users computer usually by email, BadSec
Bad Times Email Hoax
Bad 389 Virus, Bad.389 virus, Gdog.Prody.389
Bagle Worm, I-Worm.Bagel, mass mailing worm, uses a graphic of 3 cherries
BadTrans.B, AKA: BadtransII, I-Worm.BadtransII, W95/Badtrans.B@mm, Win32 system
Bak Virus, Troj/Banker-BAK
Bamestra Malware, Virus.DOS.PS-MPC-based, Virus:DOS/PSMPC_535.B
Banana Virus, AKA: Trival virus, Hanger virus, Hasting virus
Banbra.GDB Worm stealing banking information
Bandit Virus , Byte Bandit Virus, Virus.BAT.Bandit (v) BAT.Bandit.C
Bandook Trojan Horse, AKA: Backdoor.Win32.Bandok.i, BackDoor-CSN
Baobab 731 Virus, Virus.DOS.Baobab.731, Baobab.732, Baobab.dr
Banker Trojan Horse AKA: Banload and Downloader.Banload, browser exploits
Banker.LLN Trojan Horse is used to gain access to the users banking information
Bankolimb.BX Trojan, Bankolimbolimb.BW is used to steal users banking information

Barcelona Virus, Jeru Barcelona virus,
BargainBuddy not-a-virus:AdWare.Win32.BargainBuddy, Bargain Buddy

Barrnotes 2 Virus, Barrnotes Virus Barr Notes Virus
Beast Trojan Horse commonly known as A RAT Remote Administration Tool.
Behavior Blocking AKA Sandblocking
Benoit Virus is a encrypted computer virus
Best Wishes Virus, AKA: Best Wishes-970, This program... With Best Wishes
Berbew Trojan Horse retrieves passwords stored in infected computers
Beta Virus, N Beta Virus
Beva-32 Virus activates on the 22nd of any given month.
Beva-33 Virus activates on January 1st of any year
Beva-96 Virus activates on July 4th of any year.
BFD Virus, BootEXE-452 = sector eleven virus strain

Bifrost is a backdoor Trojan Horse
Big Brother Email Hoax
Bill Gates Email Hoax, Bill Gates is not going to pay you to forward emails. See Tooth Fairy.
Bit Addict Virus "You have a good taste for hard drives, it was delicious!!!
BitTera.C, Constructor/BitTera.C, disables Task Manager, NotePad, hides Start button
Black Knight Virus memory resident virus formats c to F drives, Commodore Amiga
Black Monday Virus, "Black Monday 2/3/90 KV KL MAL", AKA BorderLine Virus
Blackjack Virus, Black Jack Virus, Falling Letters virus Cascade-17Y4 virus
Blaster Worm, also known as Lovsan or Lovesan W32.Blaster.Worm, MSBlast DCOM RPC
Blaze Virus, Death Blaze Virus, Virus.DOS.Blaze.284,  Eternal Blaze, MSK.284/293 Blaz
Bljec Virus, Bljec #1 Virus, Black jec, BLJEC-1, Black Jec-358, Baack Jec.358.A
BlockChecker adware, MSN Block Checker, Triple, Agent Detector, Messenger Polygamy
Bloodhound.PDF.1 contains malicious JavaScript
Blood Lust Virus, BloodLust Virus,
Blood Virus, Blood 2 Virus, File infected by Blood Virus version 1.20, JMP statement E9
Blueman Email Hoax, Blue Man Email Hoax
Boface.G Worm spreads itself in FaceBook and MySpace
Bohmini.A Trojan Horse
BonziBuddy adware, Bonzie Buddy or Bonzai Buddy on screen software agent purple monkey
Boot Virus, Boot Sector Virus infects the boot sector on the hard drive, loads rootkits
Bot, Zombie, Internet Bots, Web Robots, Computer game bot, Drones,
Bot header, John Bot/Header, John Bot Header
Botnet is a jargon term for a collection of software robots, or bots.
Bouncing Ball Virus, Bouncing Bot, Ping Pong Virus, a small ball bounces on the screen
Brador Pocket PC virus, AKA: WinCE.Brador.A; Backdoor.Brador.A, Microsoft's CE OS
Brain virus is one 9of the earlist virus dating back to 1986, virus to infect IBM PCs

BREACH Trojan Horse, opens ports and takes control of the computer
Brothers Virus, Brothers.3 and Murphy Brothers
Browser Helper Object BHO BHOs
Browser Hijacker is a malware or spyware that changes your computers home page.
Browser Plug-in, Browser Plunin, Plugin toolbar
Bryansk Virus, activates before 3PM, BRYANSK 1992, BITE 0.01 (C)
Bubbles 2 Virus, Aqua Bubbles 2, IVP.684, IVP.684.A, IVP.719, Ivp.Bubbles virus
Bubbles Virus, Bubbles Virus Admiral Bailey IVP
Bubonic Virus, Bubonic Plague Virus
BUDDYLIST.ZIP Email Hoax, Buddy List .ZIP Email Hoax
Bud Frogs Screen Saver Email Hoax
Budo Virus "Flow like a river Strike like a thunder andrun time error"
Budweiser Frogs Virus Hoax, Screensaver Message
Buffer Overrun Unchecked Buffer
Bugslife Screensaver Email Hoax, Bugs Life Screen Saver Email Hoax
Burger Virus, Cheese Burger Virus
Burghofer Virus, Virus.DOS.GS.525,  GS.525,  Burghofer.525
Burn4Free adware, Burn 4 Free, Free DVD Copy, CD Burner, freeware
Busted Virus, VSUM, Program too big to fit in memory
Butterfly Virus. Crusaders, FMJ, Goddamn Butterflies
Butthole Virus generated encrypted

Caco-Daemon Virus
C-A-D Virus, CAD Kill Virus, AutoCad,
Cager virus, Cager.a, Cager.a Trojan through porn websites
California IBM Email Hoax
Cat-Colonic Email Hoax
Cavity Virus, A cavity virus attempts to install itself inside of the file it is infecting.
CaroEvil Virus, file infector
Cartuja Virus Casc2 Virus, worm_sircam.a in file, Caratula.doc,pif
Casc-2 Virus, Casc2 Virus,
Casc1621 Virus, Virus.DOS.Cascade.1621, Cascade.1621
Cascade Virus, Cascade.170X Virus, Series of waterfalls
Casino Virus, Casino.2330, Virus.DOS.Casino.2330, Casino.O, Malta
Casper Virus, Casper.exe, Casper Anti Virus,V2PX.Casper, V2PX.1200,
Casteggio Virus, Casteggio A-403 virus
Catman Virus, Virus.Boot.Catman , Catman Trojan Horse, Catman-B, Catman-B*, Catman1
Caz Virus, Zaragosa, Virus anti-McAfee v1.0 (C) SEPTEMBER 1991 made in Spain
(C) Brain (C)Brain CBrain, Lahore, Pakistani, Pakistani Brain, Brain-A and UIUC
CB-1530 Virus, Zeleng, Apocalypse-2, Milana, MIR, Outland, Ps!ko, Quest
CD Virus, CD-1 Virus, CD1.exe processor hog
Cellery virus, AKA: Cellery-A, W32/Cellery-A, game that runs when the OS starts. slows pc
CELCOM Screen Saver Email Hoax
Century Virus, Suriv 3.00 virus
Cerburus Virus, Cerburus-C, Virus.DOS.Cerberus.1353, Cerburus, Cerberus-1353
CFSK Virus, CFSK.918 virus, Virus.DOS.Cfsk.918.a, Cfsk.918.a, CFSK,
Chad Virus File Infection, Chad.750
CIH Virus, Chernobyl Virus, Spacefiller Virus
Civil War Virus, Civil War II AntiVirus, Civil War III AntiVirus, Civil War IV Virus
Civil War V Virus, CivilWar Virus, Virus.DOS.CivilWar.282, Virus:DOS/Civil_War.279
CkSum Virus, ckSum.exe, bad tcp cksum
ClipGenie adware, Clip Genie, Adware.ClipGenie, mcg.exe, adware.dware, dowmloads
Checksum Virus, WinHKI Checksum-Calculator Anti-Virus
Cluster Virus can infect your files without changing a single byte in the infected file
Code Red Worm, W32/Bady, I-Worm.Bady, Code Red, CodeRed, W32/Bady.worm
Color Virus, Colors Virus, WordMacro/Colors infects word documents
Comet Curcor adware an Internet Explorer Browser Helper Object, Spyware.CometCursor

Common name, Common name Toolbar, CNBABE
Com16850 Virus, COM 16850 Virus, Virus.DOS.HLLW.16850 file infector virus
COM2S Virus, COM2S.1798 Virus, Virus.DOS.V.1798,
Companion virus virus can infect your files without changing a single byte in the infected file
Computer insecurity, security exploits and defenses.
Conficker.A Worm, Win32/Conficker.A, Conficker Conficker C
ContraVirus is malware, It's not a virus, but it is malicious.
Country of Origin
CPK Trojan, Troj/Agent-CPK,, TROJ_SMALL.CJV
CPXK Virus, CPXK.1000, CPXK.1000B, CPXK.1000.A-1
CRF Virus, W32/Rbot-CRF
CSL Virus, Microelephant, Text 26.07.91.CSL-V4 & V5
CV4 Virus, VHT-CV4
CHR.869 Virus, 16-bit, copies its code in high memory and hooks the DOS function interrupt CHR869 Virus INT 21h with the service execute file, Virus.DOS.Christmas.868.
Cracker is a person who illegally uses computer networks to damage or steal, cracking
Crash Dump of Memory
Crimeware is Malware designed for the automate financial cime
CTFMONA computer virus, pop up "spools.exe", Trojan.Nudos, CTFMONA.EXE
CVP Content Vectoring Protocal
CWS.Feeds, CWS.Feads, in Pest Control
Cydoor adware, SoftClick Optimization Engine delivers advertising to a targeted audience
Daemon Tools adware, Comes with adware but it can be unchecked,
Daemon Tools WhenUSave Toolbar, Daemon Tools Lite, DT Pro Trial
Dana Email Hoax is written in Portuguese
Danmec.b Trojan Win32, W32
Darth_Vader.344, Darth_Vader.255.B, Darth_Vader.200, Darth_VadDarth Vader 3, Darth 4
Darth.201 , Darth_Vader.200 Darthvad.200.Gener1 virus Darth-Vader.cav, Intended.Darth
Darxite Daemon v0.4 password authentication
Das Auge 1.1 is a password guesser
DasHackerArchiv Dialer
DDoS Distributed Denial of Service
Deloader virus W32/Deloder.worm scans for for open 445 TCP/IPor Microsoft-DS ports.
Demolition Virus infects .COM files
Demon Virus, Z-Demon virus, WordMacro/Demon.A
Den Zuk Virus, Resident Boot sectors, destroys Brain Virus diskettes, Ctrl-Alt-F5 to reboot
DenZuko Virus, Virus memains on memory, Aliases: Ohio Virus and Hacker Virus
Deranged Virus 1.0
DeskAd.Service Trojan horse, Trojan-Downloader.Win32.Dyfuca.ds
Despite Email Hoax, "computers in your network is already infected by DESPITE-virus."
Danger of a Computer Virus
DHL delivery service. Get your parcel NR. Is a Email scam.
Diablo Trojan, Troj/Diablo Trojan, Diablo hack data file, Diablo.a, The El Diablo virus
DivX Pro 5.1, DivX Player, Torrent
Dll Virus, DLL files, se.dll Virus/Trojan
Dial Virus, A Dial up Virus, Dial V for Virus, Dial.dll
Dialing software
Dima Virus, Dima.dll
Direct action Virus loads onto 1 or more programs
Direct Revenue adware, bestoffers network, created Soho Digital. Out of business as of 2007
Dismember Virus, Dismember.288 Virus, Search.288
Disney Email Hoax," thank you for signing up for Bill Gates' Beta Email Tracking."
Disk Killer Virus, Orge Virus, "Don't turn off the power or remove the diskette while disk killer"
Distributed Deniel-of-Servive Attack DDoS
DivX Video player adware, DivX Video Codec, DivX Converter, pay for view DVD
Dloadr ZP Trojan Horse, uses Putin Death Hoax, subject line, President of Russia has died
DNSChanger Trojan can control network routers, adds rogue name servers
DoDo Virus, DoDo.2456 Virus, DoDo,
Doodle Virus, Yankee Doodle Virus,
DollarRevenue, Dollar Revenue, W32, uses 4726 and 4727 DAT files
Doomjuice worm launch a denial of service DoS attack, looks for open TCP ports
DoS Denial of Service
DOS Boot Sector, Floppy and hard drives
Download Privacy Protection Software Now
Downloader.Generic.7.AQMI Trojan Horse Fileins
Downloader-UA-h Trojan Horse
DownloadWare is Adware, Also known as MediaLoads ClipGenie, Installs through ActiceX
Downadup Worm, Downanduo worm, uses AutoPlay AutoRun
Downandup/Conficker worm uses AutoPlay and AutoRun
Do you want to learn how to protect your computer?
D-Rape21, Trojan.DOS.DATARAPE, file infector, D Rape 21
Drive-by-Download downlo0ads a program without your knowledge
Droneware takes remote control of the computer to send spam or to display Porn
Dropper Program or a Virus Dropper will run to install a virus, Trojan Horse or Worm
Druid Virus, Druid-2, Druid.313, Druid.377-B, Druid.377
Dudley Virus, MSDOS, No_Frills.Dudley
Dump, Size and Limit
Dump Volume
Dust virus AKA: Duts, Dtus & WinCE4.Dust. This code arose from the dust of Permutation City
Dutch Virus, Dutch Tiny Virus, Dutch Tiny-117, Dutch Tiny-124, Dutch Tiny-99
D Tiny Virus, Variant of the Tiny family, Trojan.Win32.Tiny.d
D-Tiny-1 Virus, file infection, Virus.DOS.Small.124, Virus:DOS/Dutch_Tiny_124.A
D_Tiny Virus, Virus.DOS.Tiny.126, Dutch Tiny, Dutch Tiny.126, Virus:DOS/Dutch_Tiny.126
D.2631 Virus, Virus.DOS.MAD.2631, Mad.2631, Virus:DOS/Mad/Mad_3732.A
DA-3732 File Infestion Virus
DA-3732-2 File Infection Virus
DA.282 File Infection Virus, Virus.DOS.Da.282.a, DA.282.A, DOS/Da.282, Da-282B
DA_boys.A, DA-boys.A* Boot Virus, virus dropper, DABoys, Da'Boys.A, DaBoys.A
Dumaru Virus, W32.Dumaru@mm, IRC Trojan called NAROD.A
DVD Virus
MyDoom virus or MyDoom.O is a mass-mailing worm uses Google, Yahoo error messages
DyFuCA Trojan Horse, DY FU CA Trojan, Dialler, Dial/DyFuCA-A, Adware-Dyfuca
Earthday Virus VCL Encrypted
Ebates MoneyMaker adware, Money Maker, MoeMoney HackTool/Jkill.A, TopMoxie
Eclypse Virus Xylo Spyware
Economic Slow Down Email Hoax, Avert Hoax Notice!!
Ectan.A Trojan Horse, Estan
ECV Virus Troj/Agent-ECV virus,
EDV Virus Resident Boot Virus
EMF Virus, EMF 625 Virus, Screaming Fist Virus, Stranger Virus, encrypted
EICAR Virus.EICAR, Europeon Institute for Computer Anti-Virus Resereach EICAR Test File
Elfbowl Email Hoax, Elf Bowl Email Hoax, Subject: FW: VIRUS ALERT!!!!
Elk Cloner The 1st Virus in 1982
Email Virus Danger
Email-Worm.Win32.Bagle.gen Trojan.generic Trojan.generic,
Email-Worm.Win32.Brontok.q, W32.rontokbro@mm, email worm
Email-Worm.Win32.Mydoom.l, Worm.P2P.generic
Email-Worm.Win32.NetSky.aa Trojan.generic
Email-Worm.Win32.NetSky.b Trojan.generic
Email-Worm.Win32.NetSky.c, Trojan.generic
Email-Worm.Win32.NetSky.d Trojan.generic
Email-Worm.Win32.NetSky.r, Trojan.generic
Email-Worm.Win32.NetSky.q Trojan.generic,
Email-Worm.Win32.NetSky.t, Trojan.generic
Email-Worm.Win32.NetSky.y Trojan.generic,
Email-Worm.Win32.NetSky.x Trojan .generic
Email-Worm.Win32.RaysWorm.generic Trojan.generic
Email-Worm.W32.Runouce.b, Worm.Generic
Email-Win32.Scano.gen Trojan.generic
Emoitus Virus, EMO Virus+
EMO Virus W32/Rbot IDE
Enemy Virus, Beloved Enemy Virus
End User Licence Agreement EULA
EPO Virus, Entry Point Obscuring, virus that hides its entry point
Errorsafe adware, error safe, issues false virus reports so you will buy a virus removal program
ETC Virus, E.T.C Virus,
Evaman virus is a mass mailing worm.Subject heading "failed transaction" and "failure delivery".

Exploit Security
Exploit-WordPad.a Trojan Exploit
Exploit-MSWord.j Trojan Exploit
Exploit.SinaDLoader.A, Trojan-Downloader.HTML.Agent.kf JS/Dldr.agent.cij
Exploit.SWF.Gen, SWF Flash Files triggers a buffer overflow, Trojan PWS
Exploit.downloader.lj, Exploit.swf, Exploit.swf.gen
Exploit.XML.http.d,Exploit.XML.http.d Trojan Exploit
Ezula, Adware.Ezula, EZinstall.exe, Ezula.dll eZinstall.exe, keywords for advertising TopText
Facebook Gampass Computer virus, email messages sent to people on "friends" lists then China
FakeAlert-BF.dr Trojan Horse Dropper
Fake "Antivirus XP 2008" computer virus & Malware, Fake virus scan, Fake alerts.
False Positive is when you scan a computer and it flags an innocent file as being infected.
FamD Virus loads an infected program
FamE Virus loads an infected program
FamH Virus loads an infected program
FamJ Virus loads an infected program
FamM Virus loads an infected program
FamN Virus loads an infected program
FamQ Virus loads an infected program
FamR Virus loads an infected program
FamS Virus loads an infected program
FamV1 Virus loads an infected program
FamV2 Virus loads an infected program
FamV3 Virus loads an infected program
FamV4 Virus loaded into Memory
Family Pictures Email Hoax, Subject: FW: VIRUS ALERT!!!! Delete email.
Farcus Virus infects the fixed disk partition
Father Christmas Virus Alias: Choinka
Faust Virus Chaos
FAX FREE Virus Memory Resident Overwriting File Infector
FAX.FREE Virus File Infecting Virus
Feist Virus Virus.DOS.Feist.670
Feist Virus Russian Overwriting File Infector
Feist-1 Virus Feist.676
Feist-2 Virus Virus.DOS.Moctezuma.2208
Feiost.500 Virus Virus.DOS.VirusC.496
Fich Virus Virus.DOS.FICHV.896 File Infector Virus
Fichv Virus File Infector Virus
Fich897 Virus Infects .EXE files Affects Runtime operation
Filedate Virus Infects .EXE files Corrupts Programs
Filename Virus Infects .COM Files, Overlays Files
File Viruses Add Code to File, Generally Program Files
Filler Virus Boots from infected Disk affects Runtime Error
Fingers Virus Infected Program Runtime Error and Data Files
Finn-357 Virus Infects .COM Files Runtime Operation
Fish-1100 Virus Virus.DOS.Fisher.1100 Fisher.1100
Fish-2420 Virus File Infector Virus.DOS.Fisher.2420
Fish Boot Virus, Chinese_Fish, Infects the Main Boot Record
Flagyll Virus, Flagyll.asm Infects & Destroys .EXE Files
Flash Drive Virus
Flashmaster G Email Hoax, Flash Master G, Watch this!! file contains the virus "El Poco".
Flash Memory Virus

Flood the system
Fratricide Virus, Fratricide.647, Viper, Leprosy
Free Flight Email Hoax,
Frere Jacques Virus, Decreases Available Free Memory
Fri13-NZ Virus, Infects.COM files, Computer RunTime Error
Friday 13th COM Virus, File Infecting Virus, VirusB
Friday 13th Virus, Version A Virus
Frodo Soft Virus, F Soft 563, Frodo.Frodo Trojan Horse
Frodo-458 Virus, Infects .COM files, Computer Runtime
Frogs Virus, Infects .COM files and corrupts programs
Frogs and Fishes Email Hoax, "If you've had forwarded Frog blender and Fish bowl to you"
FrostWire adware, peer to peer software P2P, Used in Gnutella & BitTorrent protocals Java

Fu Manchu Virus, The world will hear from me again! Message
Funprog Email Hoax, "Funprog.exec" and it contains the CIH virus.
Futhark Virus, Youth.968, and Futhark.968
FVHS-B.COM, Virus.DOS.Silver.1874 and DoS
FVHS-A.COM, Virus.DOS.Silver.1644 and DoS
Gad network adware, Sexy Girl and Crazy Girls pop up links
G Virus shown as a purple, aqueous liquid in a glass vial
Galicia Virus, Telefonica.D Virus, System virus, Boot/MBR infector
Gamespy Arade adware, online Arcade, Adware-GameSpyArcade.url, shareware
Gammima Computer Virus steals passwords to infect laptosp on NASA Space Station.
Ganeu Virus, Virus.DOS.GTM.BewareBug.1528, DOS/Dual_GTM.1528
Gaobot virus, W32.HLLW.Gaobot.AO, W32/Gaobot.worm.gen.b
Gator adware, fills out forms and remembers passwords, OfferCompanion application
Gattman virus, spreads through the program Interactive Disassembler Pro IDA
Generic!Artemis virus, opens new web sites, Trojan Generic Packed, Generic Packed Trojan, Generic10.AZHU Trojan Horse False Positive

Generic8.LDI Trojan Horse False Positive
Generic9.ABWM Trojan Horse False Positive
Generic9.ZYW Trojan Horse False Positive
Generic Dropper.eb!c22df3cf25eb
Generic Dropper.eb!0fe4b96dce4c
Generic FakeAlert.a
Generic pws.y!badb4c88 Trojan password stealer
Generic PWS.y!e6b20a51165d
Ghost Key Logger and Ghost Key Logger Lite Ghost Keylogger
Gimmiv.C Worm Exploits vulnerability in Windows Server ServiceTroj/Gimmiv. C
Graybird Trojan Horse Backdoor.Graybird Trojan Backdoor.Graybird.e
Ghost.exe Email Hoax, harmless screen saver created by Access Softek.
Girl Thing Email Hoax, "GIRL THING" please don't open it up!!!!
Girls of Playboy Email Hoax, A lot of attention!!! b Microsof,t BANCOC.VBS virus
Good Times Email Hoax engineered by a user of AMERICA ON LINE
Got You Email Hoax, Wormhas executed itself through your mailbox
Great Gas Out Email Hoax, NC Gas Rebate
Guts to Say Jesus Email Hoax, "It Takes Guts to Say 'Jesus'" do not open it.
Hackarmy virus is a backdoor Trojan copies itself win32server.scr or win32server.exe
Hacker Tool
Hacking Tool
Happy New Year Email Hoax, Warning on December 31, 1999, Happy New Year Virus delete
Hairy HP computer virus, file HP (Harry Potter) and the Deathly Hallows, infects USB drives
Hary Virus, Virus.DOS.Hary.981, Haryanto.981, Haryanto, HaryAnto
Hastings Trojan, backdoor, downloader, DDoS and DoS
Hate Trojan, I hate Trojan, I hate Trojans,
Heevahava virus, companion virus, Virus.DOS.VCL.Heevahava.503
Hello Virus, W32/Hello.worm, Internet worm, Hello.EXE, Run Time Error '91'
Hellween 1182 virus, Hellween virus Infects .COM and EXE files
Hero Virus, file infector, Hero 394, The infected system spreads the virus to other systems
Heuristic scan is used to scan to find new and unknown viruses.
Hitchcock Virus Resident virus that uses the memory to effect .COM files. Hitchcock.1238
Hitler Virus Hoax, Delete the email message
Hiperion Virus, Virus.DOS.Hiperion.249, Hiperion-249

Holland Girl Virus, This program is infected by a Harmless Text-Virus V2.1 System halted...$
Hosts File, Hostis a computer file to store information instead of the domain name system
HotBar browser, adware.Hotbar, embeds a toolbar into your browser, records every url
HTTP Misleading Application Detection
Huge virus, huge virus coming, huge virus problem, huge virus coming & huge virus threat
Hybrid Virus, sometimes called a multi-part or multipartite virus
Hybris Worm, W32/Hybris.gen@MM, W95.Hybris.gen, W32.Hybris.22528.dr
Hydra Virus, File Infector, Hydra, Hydra-0, Hydra-1, Hydra-,2 Hydra-3, Hydra-4, Hydra-5
Hydra Virus Hydra-6, Hydra-7, Hydra-8, Hydra-8Trojan & Hydra-8 Trojan
Hymn Virus file infector, Hymn is a memory resident, file infecting virus.
Hymn Virus infects .COM and .EXE files, including COMMAND.COM
IBIS Toolbar adware, related to HUNTBAR, Sends advertising pop-ups.
ICE Virus Email Hoax "ICE or I.C.E."
ICQ adware First internet wide instant messaging service, owned by AOL

Identity theft
IEPlugin adware, IE Plugin, winobject IMIToolbar, TrojanDownloader.Win32.intexp
ImIServer IEPlugin Spyware, Mcafee found
IM based worm, WORM_OPANKI.Y, which uses the file name ITUNES.EXE
Internet Optimizeris a spyware program. Also known as DyFuCA
In The Wild virus list
Install an antivirus or spyware remover to clean your computer
Insurrection Trojan Horse remote administration tool ( RAT ) backdoor program
Integrity Checker finds Trojan programs and backdoors.
Internet Worm is not a virus. It's a piece of code that replicates itself in programs & OS's
Intel Special Offer Email Hoax, PLAIN TEXT VIRUS called PII-Degrade. Slow Boat 24
Internet Flower Email Hoax, "An internet flower for you" do not open it
IProxyProvider Computer Virus, Troj / Bckdr-QNU, backdoor Trojan
Iraq War Email Hoax, There is a genuine virus W95/CIH
IRC Flood Trojan Horse, Backdoor.IRC.FLOOD.G, Flood.A.BCK, IRC.Flood
Irina Email Hoax, Irina is the title for a published book.Virus promoted books name
ISTbar.XXXToolbar, AKA Spyware/ISTbar
ITW List of viruses, Trojans, spyware etc
Invasive software
I/Worm.Sircam, I-Worm.Sircam.A
JailBreak, Jail Break, Security Assessment Tool
Jdbgmrg.exe Email Hoax, W32/Magistr@MM, bear icon, found the little bear
Join The Crew Email Hoax, Please do not open up any mail that has this title.
Jerusalem Virus, Resident ,COM EXE files, one of the oldest & most common virus.
JOKE_FLIPPED Email Hoax, flips the screen horizontally and vertically
Joke Virus, Best Joke Virus.txt, Joker Virus, Joker-1602 Virus, Joker3 Virus
Joshi Virus, The Joshi Virus, Boot sector virus, Type " Happy Birthday Joshi" January 5th
Joshua Virus, Joshua 3, Joshua 1, Boot block virus, Overwrite boot blocks ARCV.Joshua
JPGExer Downloader
JunJun Notebook computer virus is from Singapore, Check the Autorun.inf file
Kazzaa music downloads, peer to peer P2P adware, 3rd party applications Cydoor and BDE
KEYKatcher for PS/2 and USB keyboard connections
Keylog, Troj/Keylog-KW Trojan
KeyCaptor Keylogger
KeyCarbon Keylogger
KeyDevil Keylogger
KeyGhost Keylogger
Keystroke Logger
Kido! Woprm Uses AutoPlay, AutoRun steals credit cards numbers
Kleneu66 Email Hoax, "VERY URGENT READ THIS RIGHT NOW" don't download
Klez Worm, Email virus, Victim double clicks the aattachment, or even just previews it
Kohntark Dropper Virus , Kohntark.Kompanion.268 Trojan, steals information
Koobface Social Trojan Horse, W32/Koobface.worm, spreads through Facebook
Koobface B, Koobface D, Koobface Worm
Korgo virus, AKA: W32.Korgo.F, W32/Korgo.worm.g, WORM_KORGO.F
La Bible Des Moines Email Hoax,
Lanc Virus, Win32.Lanc.a, W32/Rungbu-E, Win32/Lanc.A, W32/Generic.m, registy virus
Lanc5476 virus, Lanc5882 virus Lanc 5476 Virus, Lanc 5882 Virus
Larry Virus, Virus.DOS.Larry.491.a, Memory resident parasitic virus
Larry Virus Copies itself into Interrupt Vectors and hooksINT 21h
Lazy Virus, File Infector, all infected files will contain text string "lazy" near the end of a file
LCV Virus is a computer virus that infects.COM files
Leapfrog Virus, Alias: USSR 516, Leapfrog.516, USSR-516
Leech Virus, File infector virus, Topler, Anti-Leech Virus
Leech-2 Virus, Virus.DOS.Leech.1024, Virus:DOS /Leech_1024.A, File infector virus
Leech-3 Virus, Virus.DOS.Leech.Klang.1024, memory resident overwriting file infector
Leech-4 Virus, Virus.DOS.Leech.Glist.1014, Virus.DOS/Leech.1014
Leech-F Virus, Leech-F-1, Vgen/47051, memory resident file infector virus
Leech.1017 Virus, Virus.DOS.BW-based, Univ/f, Bin.Auto.CSQ, Virus:DOS/Leech.1017
Leech.A Virus, Virus.DOS.Leech.Tazta.1008, Leech #6 Virus, Virus:DOS/Leech.1008
Lehigh Virus, Lehigh University, Lehigh is desructive, overwriting, file infecting virus
Lenart Virus, AntiCMOS, AntiCMOS.b, CMOS, Killer, Gaxelle Lenart LiXi, MBR Virus
LeoSrv Trojan Horse Toolbar, leosrv.dll, Leosrv Toolbar
Leper AOD Virus, AoD Leprosey.B
Lets Watch TV Email Hoax, Subject: IBM OFFICIAL VIRUS WARNING
LIB1172 Virus file infector, Virus.DOS.Liberty.1179, detected bythe pattern file
Liberty Virus, Alias: Mystic Virus, -M Y S T I C- COPYRIGHT (C) 1989-2000
Life is Beautiful Email Hoax, "Life is beautiful.pps". Do not open it.
Link Virus manipulates how files are accessed through the FAT file system
Liquin Code - 2 Virus, infects .COM files, Liquid Code Virus
Lisbon Virus, Vienna Virus strain, Vienna.648.Lisbon.A, infection by random IF
LIST.DOC file Melissa Virus acccess to passwords to 80 pornographic websites.
Little Brother Virus, 299 byte and 300 byte, Buggy companion type virus, it can delete files
Little Brother Virus, The 307 byte may be harmless,
Little Brother Virus, Littlebrother.349, Little Brother.341, LittleBrother.2
Little Brother Virus, Little Brother.361, Vote.2, Little Brother-family
Little Girl Virus, Resisent invects .COM and .EXE files
Little Pieces Virus, Resident .EXE files, One of these days I'm going to cut you into little pieces
LiXi Virus, Virus.Boot.Anticmos.Lixi, , AntiCMOS
LixoNuke Virus, Lixo Nuke Virus, Tormentor Lixo Nuke
LOC Email Hoax, In addition to the PWL and registry files
Logic Bomb lies dormantuntil a specific program is used or a message is sent to it.
Look2Me Trojan Horse is an advertizing Trojan that displays popup ads.
Loveletter Virus, VBS.Loveletter, Lovebug I-Worm.LoveLetter, VBS/Love Letter.AMabutu
Lovgate computer virus, mass mailing and network worm, steals passwords, W32/Plage.worm,
LPT-OFF Virus, File inmfector, Virus.DOS.LptOff.271, Univ/a, LPT-off.271, LptOff
Lump of Coal Email Hoax, Warning on December 25, 1999 you may receive an email
Macmebig Email Hoax, Mac Me Big Email Hoax
Macro Virus is written in Macro language, exploits, infects Microsoft Word
Magnitogogorski 3 Virus, file infector, Virus.DOS.Mgn.3000, Gorsk
Magnum Virus, WordMacro Magnum.A, infects documents created in Word.
Mail Server Report virus distroys everything on your hard drive
Malage Virus, resident, not boot sector, infects .COM & .EXE files, Virus.Multi.Malage.2385
Malaise Virus, Aliases: Virus.DOS.Info.1355 and Virus.DOS/Malaise.1355
Malicious software codes try to steal your privacy information, such as credit card numbers
Malicious Software Removing Tool
Malign Virus, Malign.575, Malign.630, Malign.630-0, Malign.630.A, file infector virus
Malmsey Habitat v3.b Virus, Malmsey.asm, Malmsey.2, Malmsey-1703, Malmsey2 Virus
Maltese Amoeba Virus, Maltese Amoeba Win32 executable file virus, Maltese_Amoeba

Manicomium Email Hoax
Mannequin Virus, The virus cuts the top bit on all characters sent to the printer
Manola Virus, Manuel-957, Manuel.957
Manta Virus, VCS V1.0 Manta Virus, VCS.Standard.Manta
Marauder Virus, BBS Virus, only found on virus-exchange BBSes,Manual Virus Joke,
Malware Hoax, You hace received a Taliban virus. Chief Hacker, Taliban
Marijuana Virus, Virus in a game called Dope Crop or Weed Farmer. Pot Virus
Marijuana Virus!! It's 4:20, Time to toke up.W32/Marijuana, Marijuana Worm
Mark II virus, CVDL Mark.350.A, Mark-350, Mark.350.350.a, Mark II.350
Marijuana Trojan, changes your home page and Internet Explorer to Marijuana Explorer
Marti Bros Virus, resident boot sectors, destroys copies of the Brain Virus on diskettes.
Mass Mailer Worm W32.Sober-K-mm spreads itself as an email attachment
MaxSpeed Spyware, also known as Adware/IEDriver, displays pop-ups & pop-under ads
McWhale Virus, McWhalen Dropper, MPC.McWhale.dr

MBS Trojan Horse Micro Billing Systems
Means of transmission needs to find a way to spread the virus or worm, Means of Infection
Mebroot Trojan Horse Trojan.Mebroot, Java Trojan Horse
Melissa Macro Virus, Melissa Worm, shut down Internet mail systems with infected emails
Melissa Worm, Melissa.U, Melissa.V, Melissa.W, Melissa.AQ
Mem Lapse 323 Virus, Virus.DOS.MemLapse.323, MemLapse.323, Lapse.323
Mem Lapse 366 Virus, MemLapse.366, Memory_lapse.366A, not memory residen virus
Mem Lapse 375 Virus, MemLapse.375, *ML.C?M Memory_Lapse.375A, encrypted virus
Mem Lapse.385 Virus, Chromosome Glitch v3.0 hook INT21h and hitCOM- MemLapse 385
Mem Lapse 406 .com Chromosome Glitch v1.0 not memory resident virus, MemLapse 406
Mem Lapse 407 Virus Chromosome Glitch, not memory resident virus, Memlapse 407
Mem Lapse 449 Virus .EXE Chromosome Glitch v2.0, 1993 Memory Lapse, MemLapse 449
Mem Lapse 465 Virus, MemLapse 465 , Golgi Testicles, memory resident virus
MemLapse 605 Virus, MemLapse 605 Virus, Golgi Testicles v1.0, memory resident virus
MemLapse 787 Virus, MemLapse 787 virus, Nympho Mitosis, v2.0, Phalcon Skism
MemLapse 820 Virus, MemLapse 829 Virus, Golgi Testicles v3.0, memory resident virus
MemLapse 839 Virus, MemLapse 839 Virus, Nympho Mitosis v1.0, memory resident virus
MemLapse 845 Virus, Memlapse 845 Virus, Nympho Mitosis, v1.0 memory resident virus
Messenger Plus! Live software comes bundled with adware if not unchecked during installation
MessengerSkinner adware, Messenger Skinner adware,, MSN messenger
Micro Bill Systems Trojan Horse, Microbill System, Smitfruad family
MicroBillSys Trojan Horse, Microbillsystems Trojan Horse, MBS, Micro Bill Systems

Microbillsystems Trojan Horse
Michelangelo Virus, infect MS-DOS systems, operates at the BIOS level
Michelangelo A Virus, Michelangelo.A Virus, Michelangelo.B, Michelangelo.C, Boot virus
Michelangelo.D Virus, Michelangelo.E, Michelangelo.S Virus, MBR Virus Boot Sector
Michelangelo II Virus, Master Boot Record, infects MS-DOS systems not operating systems
Micro Antivirus 2009 Security Center, MicroAV, unregistered version Activate Now! "Don't"
Milk Carton Bug Email Hoax,
Mindless Virus, Mindless-429, Mindless-1, VCL.429, VCL-Mindless,
Mini-125 Virus, Virus.DOS.Mini.125.a, Virus.DOS.Mini.15.b, Mini.125b, Small.1253
Mini-132 Virus, Virus.DOS.Mini.132, Mini.132, Foxy, Tiny.132, Foxy.132
Mini-195 Virus, Mini.195, Ionkin.195, Virus.DOS.Mini.195
Mini-207 Virus, Mini.207, Virus.DOS.Mini.207, SillyC.207.AMINI-5
Minimax.Boot.MiniMax, MiniMax, MinMax
MiniMite Virus, Malware: File Infector, Virus.DOS.Mini.183, Mini.183, mini-183
Mirar ToolBar is a browser Help Object BHO, displays advertising
Missing Child Email Hoax, Subject: VIRUS WARNING-Re: FW: Missing Child
Morris Internet Worm, Network Virus of Morris, Morris Virus, Phillip Morris Virus
Mr.G Virus, Mister G virus, Mr.G File Encryption
Mr-VIR Virus, File Infector, virus.DOS.Mrvirus.508, Mr Virus,
MSK Virus, Jasmin/MSK Virus, Blaze-MSK, MSK-272, The Jasmine

MS08-068 Vulnerability in SMB could allow remote code execution 957097
MS08-069 Vulnerability in XML core services could allow remote code execution
Multipartite Virus infects multible different targets. Multi Part Virus
Multi Virus Cleaner is a free utility that detects and removes viruses.
Multi 11 Virus infects .COM and .EXE files
Murphy Virus effrcts .COM and .EXE files
Music Bug Virus, Resident Boot sector, MusicBug v1.06 MacroSoft Corp Made in Taiwan
MusicPanel Email Hoax, Music panel, MUSIC 'VIRUS' TO ATTACK SONG THIEVES
Mutant Virus Crisis in a Computer World is an NES video game
Mutating Interrupt Virus, Mutint.694, PS-MPC.0692.AO.GEN, Mutating Interrupt-694
Mutation Engine Virus, Darwinian Genetic Mutation Engine, Virus creation tool
Mydoom Worm, W32.Mydoom.A@mm, W32.Novarg.A@mm, WORM_MIMAIL.R
My Search Toolbar, MyWebSearch, AKA My Search Bar, MySearch, Search Assistant
Mytob Worm is a baack door mass-mailing worm
Nachi virus copies itself to the %SYSTEM% folder, "LET HISTORY TELL FUTURE!"
Nazi Virus, Dirty Nazi Virus, Infests e-zine, DOS based, .PAS source codes
Naiva virus, look for messages Bird flu outbreak in North America or What is avian influenza.
Necro Virus is a file infector
Necrophilia Virus, Necrophilia.A, DOS file infector, Virus.Boot.Necrophilia
Necrohilia.A-B, This is a boot virus. It is infected by the latest pattern file
Netsky Worm, W32.Nestsky@mm worminfects the Windows XP Service.exe program
Net-Worm.Win32.Allaple.b, PE_VBAC.A, installs in the registry, Trojan.generic
Net-Worm.Win32.Mytob.c, Trojan.generic Worm.P2p.generic
Net-Worm.Win32.Mytob.t Trojan.generic
Net-Worm.Win32.Mytob.u, Worm.P2P.generic
Net-Worm.Win32.Nimda, String, Concept Virus (CV) V.5, Copyright (C) 2001 R.P. China
Newbug Virus, New Bug Virus Alias D3, Anti-exe and antiExe
New Sunday Virus infects .COM and .EXE overlay files and data files
New York Big Dirt, "NEWYORK BIG DIRT" and "THE FUxxER" file named "WWZ.SIP".
New Zealand Virus is the same as the Marijuana or The Stones virus
New 1701 Virus Alais:Cascade B Virus, Cascade.1701.A, Cascade=Autumn=Herbst (laub)
Netsky Virus, Netsky.ab is a mass mailing worm, blank subject line, file has a .pif extension
Network Virus replicates itself,
NoAdware, No Adware, Misleading Application
NoCopy.Virus, CoCopy, NoCopy.3685, Virus.DOS.Nocopy.3685
No_Frills.Dudley Virus. Ol Dudley virus, infects files
Nokia Screensaver Email Hoax, If you receive any CELCOM Screen Saver Pls.
No Par Virus is a file infector virus
Nopir virus attempts to delete all MP3 music files
Norman Anti Virus, Norman Anti Spam, Nowman sandbox technology, Norman Security Suite
NortelAntivirus, Nortel Antivirus,
Not.586 Virus, CVDL Not.Family, Virus.DOS.Not.586, Virus:DOS/Not.586
Not-A-Virus:Adware.W32.Agent.cp is a backdoor Trojan, BackDoor-CQQ, Troj_Agent.QW
Not-A-Virus:Adware.Win32.Agent.zk, adware backdoor Trojan, bug of Kis virus
Not-A-Virus:PSWTool.W32.RAS.a, PSWTool.RAS
Nov17 Virus, Nov17.800b
Novarg Virus, WORM_MIMAIL.R, W32/Mydoom@MM, WORM_MIMAIL.R
Nuclear RAT Trojan Horse author Caesar2k, Short for Nuclear Remote Administration Tool
NucRat Trojan Horse, R.A.T. It highjacks the server to allow processes & gain admin rights
Nuke Attack causes Windows to crash by users that know you IP address
Nuker TCP/IP DoS attacks WinNuke DoS attack
Null Virus, Null.exe
Number 6 Virus, #6 Virus
Number of the beast virus, The 512 Virus, Virus.DOS.Beast.e, V-512e
Nygus KL virus is a computer virus which infects .COM and .EXE files.
Nymem virus, Kama Sutra, spreads under the desguise of pornographic content
Obfuscated.en Trojan Horse, Trojan.WIN32.Obfuscared.en, Malware
Objective Criteria
Oemji ToolBar adware, Oemji.ToolBar, redirect, It adds an internet explorer toolbar Oemji
Offspring Virus. This is a file infector virus
Off Steath Virus SCMV prevents Windows from updating
Ogre Virus, Disk Killer -- Version 1.00 by Computer Ogre 04/01/89 Warning! !
Ohio Virus is a memory resident Boot virus. It is detected by the latest pattern file
Ohio.A Virus, Virus.BOOT.OHIO>BDOD file infectors simply replicate & spread
OMT Virus, .413 Virus, Virus.DOS.Search.413, Overwriting file infector virus
Olympic Torch Virus Hoax, do not open or forward
Ontario 3 Virus, Ontario.2048 virus, Ontario.MP.2052a
Osama hanged Email Hoax, THIS IS A HUGE Warning!!!!!PLEASE INFORM
Optix Pro Trojan Horse, OptixPro, Backdoor.OptixPro.13b, remote attacker
Osama Vs Bush Email Hoax, subject "Osama Vs Bush", please delete that mail right away.
P1 virus, encrepted virus, effects .COM files
P529 virus, This is a memory resident File Infector virus.
PA-5792 Virus A computer virus which infects .EXE files.
Packed.Generic.197 heurtistic detection for obfuscated or encrypted files, detects a packer
Packed.Generic.198 heurtistic detection for obfuscated or encrypted files, detects a packer
Packed.Generic.199 heurtistic detection for obfuscated or encrypted files, detects a packer
Packer.Malware.NSAnti.1 PWS-Onlinegames trojans which attempt to steal passwords
Packer.Malware.NSAnti.AD PWS-Onlinegames trojans which attempt to steal passwords
Packer.Malware.NSAnti.AG PWS-Onlinegames trojans which attempt to steal password
Packer.Malware.NSAnti.J PWS-Onlinegames trojans which attempt to steal password
Packer.Malware.NSAnti.K PWS-Onlinegames trojans which attempt to steal password
Packer.Malware.NSAnti.Z PWS-Onlinegames trojans which attempt to steal password
Packer is a tool that compresses, encrypts or obfuscates executable files.
Parite B Virus, W32/Parite-B Win32 executable file virus, effects EXE & SCR files
Parity B Virus, This worm is also known as Parity.B, Parity_Boot.b.
Passive Tracking Technologies
Password Cracker
Password Stealer
Payback Email Hoax, "GOT YOU" If you were dumb enough to open this email...
Payday Virus, infects .COM and .EXE files including COMMAND.COM.
PC Anti Virus Advance Soft 2008.21823, Freeware, Protection from viruises, AVProtect
PCCBB11 Virus, PC Vectors Hooked: INT 21h, INT 24h
PCBB3072 Virus, PCBB 3072, PC Vectors Hooked: INT 21h, INT 24h
PC Flu Virus, Once PC Flu is memory resident, it will infect .COM programs
PeopleOnPage is a webbrowser that allows you to see other POP members who visit a site
PenPal Email Hoax, Pen Pal Email Hoax, PENPAL GREETINGS! delete it .
Perfect Keylogger
Perrin.exe Email Hoax, text "VIRUS WITHOUT CURE."
Personally Identfiable Information PII
Phantom Menance Email Hoax,
Phatbot Virus, Poybot "The Microsoft Office of the computer netherworld".
Phishing is an e-mail scam to get your personal information or identity theft.
PI Virus, W32/Autorun-PI
Pinfi virus, Pate, Win32.Parite.a, W32/Pate.a, W32.Pinfi, Win32.Pinfi.A, PE_PARITE.A,
Pigeon AXLM Trojan Horse
Pikachus Ball Email Hoax, WARNING!!!!!! PIKACHUS BALL.exe
Ping Pong Ball virus a boot sector virus. Shows up on the first cluster on the disk. 1KB
Ping-Pong.A only infests floppy disks
PLO Virus, AKA: The Jerusalem virus
Polip computer virus, is a P2P virus that is via P2P client like BearShare. W32/Polip
Polymorphic Virus, no two are exactly alike, capable of destroying the entire operating sysytem
Pool Party Email Hoax, "COME TO MY POOL PARTY"...or "AOL POOL PARTY, delete
Pop up menu, Popup menu, Java and Javascript, Flash
Pop up popups
Pop up windows
PornDigger! free adult image file sharing program used for sharing photos & images
Porridge Virus, porridge.1384
Port Scanner is software used to scan firewalls
Portable Executable Format is a file format executables, DLL's and object code.
Poison Ivy Trojan Horse
Posion Ivy Trojan Horse
Postcard computer virus, carrying a message from "a family member".
Potentiially unwanted program PUP
Powerscan adware, Power ScanDisplays advertising while the program is running
Premium Search Trojan Horse
Prepending Virus W32/Kraze.a is W32v preteding virus that infecs Windows executable files.
Privacy Policy
Privilege Elevation
Proactive Protection
Process Killer
ProRat Trojan Horse
Pretty Girl Virus, "gai Xinh", Virus was only written in Veitnamese, Yahoo Messanger contacts
PUP, PUPs, potentially unwanted software, includes adware, dialers and spyware malware
PWS-Gamania.gen.a, PWS-Gamania.gen.a!F6321F6F
QQPass computer virus, steals passwords and user information, Visual Basic (VB) application
QQPass Trojan Malware, QQ Pass, Q Q Pass
Randex Virus, W32.Randex.RH, W32.Randex.E, Backdoor.SdBot.gen
RAR.Password.CIRC controlled "racker.v4.00.WinALL.CRACKED-ENERGY
Rbot Virusis an IRC controlled backdoor or bot, creates a mutex
Rbot, turns on webcam so people can see what your doing without you knowing.
Redirect re Direct
Registry Keys
Remote Access
Remote Access Administration Tool RAT
Remote Control Software
Reply to All Denial of Service, Large companies emails and several people hits reply to all
Resident Virus
Revealer Keylogger
Reyes Predie Viris infects .COM files
Ricky Chaplin Virus, fake
Risk Modeling
Rjump worm targets USB memory drives and disk devices
Romainian Virus, Antiman.A, kidnapping of three Romanian journalists in Iraq,
Romote Control Software
Root, Swap, Boot, Dump Size Limit
RugRat Virus, Rug Rat Virus, W64/Rugrat, W64.Rugrat.3344, W64_RUGRAT.A
Russian Tiny Virus, Simple virus, which does nothing but replicate when fies are copied
S-847 Virus, and S847 Virus .
Sabath Virus, Sabbath Virus,
Sacramento Virus, Sacramento CA, Sacramento spyware, Sacramento Trojan Horse
Saddam Virus, SADDAM.KICK.VIRUS, IRAK = Saddam Hussein = Disk-Validator Virus
Sadist Virus, Sadist.1209, Sadist.1434, Sadist 1435, Sadist
Saiist Virus, Sai ist Virus,
Sair Virus, Virus.DOS.Sair.1150, Datalock, DataLock.1150
San Diego Virus,
San Diego Spyware, San Diego Trojan Horse
Sandra Virus, AntiSandra Virus, Skype virus
Sandman URL Email Hoax, DO NOT OPEN! It is at vienna 6318
Sandwich Virus, W32/Kies-A, virus at the start of the file, host at the end or host then virus
Saplad Roberto Virus file infecting virus
Saratoga Virus, Icelandic.642.A, .EXE file infecting virus
Sasser Worm, W32.Sasser.Worm, W32/Sasser.A.worm, WORM_SASSER.A
Satanz Backdoor 1.0, 1.0 a, 1.0 b server, 1.0 final, 2.0 beta, Remote access Trojan,
Saturday 14th Virus, Saturday Virus, Durban Virus, Executes on any Saturday the 14th
Sayha Virus, Sayha.4000, CVDL Boot/PFS.4182, RedArc.327, Sayha Waptpu Virus
SCA Virus is the first computer virus created for the Commodore Amiga
SBC Virus, Anti SBC virus, SBC Yahoo Internet,
Scanner scan files for malicous code
Schrunch Virus, Scrunch Virus, Univ/p.dr, PS-MPC (7), Scrunch
Schrunch Virus-1, Schenk.420 (McAfee), PS-MPC (9), Virus:DOS/VKit_DA.420.gen
Scob virus AKA: JS.Scob.Trojan, Download.Ject, and JS.Toofeer executes a JavaScript file

Screen Saver

Scanning ports or IP addresses
School Backdoor Trojan Horse School Back Door Trojan Horse
Script Viruses, BAT Viruses, HLP Viruses, JS Viruses, INF Viruses, PHP Viruses, VBS Virus
Script Virus, Batch Files, JavaScript, PHP Hypertext Preprossor Virus, Windows Help Files
Schrunch Virus, Small-ARCV, Math-Test, PS-MPC Math-Test virus, Abraxas, encrypted
Schwindler is from Portugal Backdoor Trojan Horse
Scott's Valley Virus, Mule Virus, Slow Virus, Variant of the Jerusalem Virus
Scream 2 Virus, Screaming Fist_Virus, AKA: Screamer, Screamer II, Stranger virus
Scribble Scribbling Virus, list of viruses
Screen Capturers Capurers, Screenshot, screen dump, records monitor displays
Screen Scrapers colletcs character based data fropm the display output. Search Engine Spiders
Scroll Virus is a file infecting virus, "{Scroll} ICE-9 ARcV" "\Command..COM
SCT Virus, SCT extension for script files, SCT Files Hit by VBS.LOVELETTER.AS Virus
Scythe2D Virus, BtDr.ARCV, ARCV.boot-b, VGEN/251.0, Compressed Boot Dropper
Sdir Virus, Virus.DOS.Australian.SDir.550, Univ/a, Austr_Parasite.550.B, AUSPARA.550-C
Secrets Virus infects.COM and .EXE files
Securedliveclicks .com matches the signature of a known attack
Security Analyst Software
Security Exploit uses Internet Explorer (IE) to attack Mozilla Firefox
Security Patch
Security Risk
Security Update for OS Microsoft Windows Microsoft Official Update Center Trojan Horse
Semtex Virus, CSFR-1000, S E M T E K by Dusaan Toman
Sentinel Virus, File infector, Sentinel-X Virus, program that self-replicate recursively
Seoul Virus, Seoul anti Virus, Seoul Trojan Horse
Serena Virus, Cascade-792, CVDL Cascade.792,
Sh Virus,, IMC-SH Virus,
Shadow Virus, Shadow NecroSoft Enterprises-a division of BCA Greets to SKISM
Shaman Virus, Shaman-251, CVDL Shaman.251 Malware
Shake Virus, Shake.3, Shake-476, Shake.476.C, CVDL 2, js/joke-shake virus
Shaft Trojan Horse allows attack by proxy.
Shanghai virus infects three .COM files,
Shareware trail based software with limited time or functionality. Popularized by Bob Wallace.
Shark 2 helps creates Trojan Horses capable of stealing data and used in a Backdoor
SHeur.CFQB Trojan Horse BitTorrent DNA 6.1.exe
SHeur.CRTP Trojan Horse, AVG Sheur.JH trojan false alarm, SHeur.AFJ
SHeur.ZSQ Trojan Horse, BitComet won't install, SHeur.DKL, SHeur.DFF
Shiny Happy Virus, Virus.DOS.Shiny.719,  by Hellraiser and Dark Angel of Phalcon/Skism
Shock Therapy Virus, Shock.NFO,
Shruggle or W64 Shruggle used to identify vulnerabilities in 64 bit
Silence Virus, Virus.DOS.V-Silence.4096, Silence.4096, Univ, polymorphic parasitic viruses
Silly Willy Virus, file infector, Trojan, Virus.DOS.SillyWilly.2256, SillyWilly.2256,
Silver Dollar Virus, Silver3b, Leprosy 2070 2071, CVDL Silver Dollar, Leprosy.Silver.20  

Sircam Virus, W32/SirCam@mm, WORM_SIRCAM.A, W32/Sircam, Sir Cam virus
Simple 1992 Virus, Search.424, Simple 1992.424, Simple-424
Simulati Virus, VIRLAB, pop ups, DOS computer virus
SK Virus, Troj_BHO.SK virus, SK1 Virus, SK1.ASM, W95.SK-1, SK.8045
Skeleton Virus, Dancing Skeleton Virus, Dancing Bones
Skew 469 Virus, Virus.DOS.Skew.469, UNIV/G, Skew, SKEW-469-1
Skism.808, CVDL 4, Leprosy.Skism.808.C
Sleeper Agent
Small Trojan Horse Trojandownloader win32 Brower attack. Few warning signs while loading
Small 129 Virus.DOS.Small.129, Russian Tiny.129, RussTiny.D
Small 132B Virus.DOS.132.B Russian Tiny.D.132
Small 146 infects .COM files
Small 157 infects .COM files
Small.178, AT.178, Small-178
Small.185, 185 virus, SillyCR.185
Small 187, Virus.DOS.Small.187, Small.187
Small.T Polyomaviruses
Small.38 Trojan Horse Backdoor, Small.38R
Smiley Central adware downloads free smileys, emoticons, and other animations. IE plugin
Smily infects .COM files
SmitFraud found in the C:\Windows\System32\Drivers folder
Smithsonian Trojan Horse
SMTP Simple Mail Transfer Protocol
Snoopware Spector Pro monitors users activity
Snoop Management Tools, Directory Snoop is a cluster level search tool for FAT & NTFS
Snow White and the Seven Dwarfs W95.Hybris.gen/W32/Hybris@M Worm
Sober Virus, w32.Sober.l@mm, Win32.Sober.W
SoBig Virus Worm, W32/Sobig.f@MM, WORM SOBIG.F,
Software Robots
Solano 2000 computer virus, Standard DOS file infector.
Something Virus, Sleuth 911, Something...Virus
Soupy, Infector of .COM files, "There's a Virus in your Soup!"
Sov Virus infects .COM files
Soyun Virus infects .COM file
Spam, Cancellable USENET Spam
Spammer.AKE Trojan Horse, Trj/Spammer.AKE
SpamThru computer virus, SpamTrhu, sends spam from an infected computer
Spanish Trojan Master Boot Sector Virus targets online banking
Spanish April Fool Virus, April.fools.Day.2008.DVDRip.XviD.V.O.Sub.Spanish
Spartan Horse Email Hoax, Attemps to get dialup users username and password,
Spawning Virus can infect your files without changing a single byte in the infected file
Spectorsoft Keylogger
Spanz Virus that infects .COM files including
Spar virus, W32/SPAR virus, SPAr 2317 strain
Spawning Virus, or a Companion Virus, Spawning popup,
Spear Phishing, e mail spoofing fraud
Spy-Agent.Bw Trojan Win32 W32
Spyer, Password Spyer 2K
Spyforms.BQ Trojan Horse, Trj/Spyforms.BQ Trojan Horse, obtains passwords
Spy Sheriff adware, Adware.SpySheriff, Brave Sentry, SpyTrooper, PestTrap
Spyware Doctor
Spy Ware
Squawk Virus, BtDr.Squawk, Squawk.852, Boot Dropper
Squeaker Virus, Squeaker #3 Virus, Virus.DOS.Squeaker.1091, Squeaker.1091
Squisher Virus, Tiny Hunter, A strand virus. Squisher.dr Trojan, Squisher.cav.240
SRE Virus, SRE-2241, Simple Rule Engine,
Saf Virus, [SAF], wsock32.dll file, TROJ_SKA.WSOCK32 virus
Staf Virus, A demonstration virus. Virus Demo Ver.:1.1- Handle with Care! Staf.2083
Stahl Platte Virus infects .COM files, StahlPlatte Virus,
Startpage.AL, Startpage_Al, Startpage.Al.gen
State Management Tools, Hidden forms fields, Query State, Application State, Session State
St Patrick's Day Email Hoax, Subject: St. Patrick's Day Irish Virus Alert, it can contain a virus
SRE Virus, Simple Rule Engine, SRE-22
SQE Virus, SDBot.SQE, Signal Quality Error, SRE-2241, SRE-2241-B
Stealth_C Virus, Boot Sector, self replicates, spreads to other computers, Stealth
Stoned.Standard, DOS Boot sector computer virus
Stoned infected 360KB 5.25" diskettes, mStoned.Michelangelo, Stoned.Michelangelo.A
Storm Trojan Horse AKA Peacomm, effects AOL Instant Messanger, Storm Worm
Storm Worm Botnet computer virus, FBI verse Fasebook, wapdailynews .com link Don't do it
Stranger Virus, Virus.DOS.Stranger.734, overwrites *.DB* files, It traces & hooks 21h
Striker Virus, Striker #1 Virus, Virus will not effect files shorter than 13 bytes
Stupid Trojan Horse, Trojan.Bat.Stupid, BAT_STUPID, Troj/Stupid, Stupid Virus, Viruses
Subliminal Virus, Subliminal Meming Trojan Horse,
Suicide Virus Suicidal Virus steals files and/or passwords
SULFNBK Email Hoax, SULFNBK.EXE file may become infected
Sunday computer virus, member of the Jerusalem virus family. "Today is SunDay!"
Sunday-2 Virus, CVDL, Sunday-1.C,
Sundevil Virus, Sun Devil Viris, SunDevil-762, SunDevil 2
Suriv 1 Virus, Argentina, Xuxa, Dad, Anti D, "April 1ST HA HA HA YOU HAVE A VIRUS"
Suriv 402 Virus, Suriv A Virus, Suriv B, Suriv 2.01, Surin 3.00
Surrender Virus, Surrender-513, Mayak.513
Susan Virus, W32.HLLC.Nasus, Suddenly Susan Virus.Win32.HLLC.Susan
SVC 5.0/6.0 Virus, Windows Mobile Pocket PC
Sverdlov is an encrepted virus, Hymn.Sverdlov, USSR
SVir Virus, SVir-0, SVir-A
Swap Boot, Swap Boot drives, Swap Boot disk, No Swap Boot Option
Swen - "News" spelled backwards
Swiss 143 virus, Swiss-143.A, Mini-143, Swiss-143-143
Swiss Phoenix, Backdoor.Phoenix, BackDoor-RV.svr, BKDR_PHOENIX.190 Trojan
SX Virus, Backdoor-SX, SX.731, sX-Ectsasy, sX-RooR, W32/Rbot-SX virus
Sylvia Virus, Sylvia V2.1, Sylvia.dll, Holland Girl Virus, Message is FUCK YOU LAMER !!!
Symbian Trojan, Skulls.L pretends to be a copy of F-Secure Mobile Anti-Virus,
Sys Virus, Emergency!!! Virus in SYS restore!!!
Syslock/3551 virus, Virus.DOS.Advent.Syslock.3551, SysLock, MACHO, Syslock.3359
System Modifing Software
Sysmptoms of a Trojan Horse
Sysmptoms of a virus
Sysmptoms of infection
System Modification Software
System Monitor
T-1 Virus, T1 Virus, T1.doc, infects .COM file in the current directory, T series virus
T297 Virus, T 297 Virus, Virus.DOS.MemLapse.297, Virus.DOS.Tmtm.441, Tmtm.441
Tabulero-1 Virus, Tabulero 2 Virus, TABULERO-1, Tabulero (2), :DOS/Tabulero_2048.B
TagASaurus is an adware program that pops up a search engine window to display advertising
Taiwan3 Virus, Taiwan3.txt, Hunters like Anticad2, & Plastique, Taiwan file infector
Taiwan4 Virus, Virus.DOS.Jerusalem.Taiwan.3088, Anticad.2454, AntiCAD.2454 (x)
TopMoxie, adware.TopMoxie, memory-resident program that displays pop-up advertisements
Targeted attack
Tax Return Email Virus, to capture your tax return, Federal extensions
Telecom Boot Virus, Boot sector virus, Telefonica virus, Anti-tel, Telecom File Virus
Telekom virus, fake Deutsche telekom page spreads trojan virus
Teletype Virus is not a virus, but a common false alarm from CPAV, Teletype 2 Virus
Terror Virus, Terror.asm
Test Virus, Tester Virus, Virus Scanner Test, Test File,
The Sunday Virus is closely related to the 1813 virus.sits in memory and infects & erases files
Torpig Trojan Horse, Troj/Torpig-A Trojan, also known as Sinowal and Mebroot
TP Virus, W32/Rbot-TP, Backdoor.Win32.Rbot.gen, Symantec tries tp patent virus updates
Tracking Cookies
Tracking Software
Tremor2 Virus, CVDL Tremor2, Tremor.A, Tremor.B,
Tribal Fusion adware for advertisers that use pop ups and pop unders ads
Trident Virus, Trident.914, Cybertech-914,
TridenT Virus, TridenT virus Group
Trigger virus
Triple Shot Virus, Triple.Shot file infector virus,

Troi Two Virus, Troi2.doc, Troi Virus,
Troj/Zloblz-Fam IDE
Trojan.Autorun.TE is a autorun.inf file created by worms placed in the root directory
Trojan.Autorun.zh, Trojan.Autorun.zg, Trojan.autorun.aat, trojan.Autorun.aau
Trojan.Backdoor.Haxdoor, Fake email that looks like it came from Microsoft
Trojan.Clicker.CM, Displays advertisers pop-ups
Trojan.Clicker.HTML.IFrame.AR, malicious JavaScript
Trojan-Clicker.HTML.IFrame.js, TrojanClicker
Trojan.Win32.DNSChanger.ech issued by rogue antivirus software called Antivirus 2009
* Warning! Spyware detected on your computer! Install antivirus or spyware remover to
* clean your computer Found Spyware: Trojan32.DNSChanger.ech
Trojan.DNSChanger.ech, DNSChanger Trojan, Zlob Trojan
Trojan.Downloader.win32.agent, Trojan.downloader.win32.agent.agfw
Trojan.Downloader.win32.agent.akwa, Trojan.Downloader.win32.agent variant
Trojan.Downloader.win32.small, Trojan-Downloader.win32.small.bdc, Windows PE EXE file
Trojan.Downloader.Wimad.A, Tricks user to installing disguised as a music video player
Trojan.Downloader.WMA.Wimad.N downloads remote file from remote web sites.
Trojan-Downloader.Win32.Agent.xqz, Windows Firewall detected suspicious activity.
Trojan-Downloader.Win32.Agent.yaw Maliious software codes try to steal your privacy info
Trojan-Downloader.Win32.Agent.xws Privacy information such as credit card numbers
Trojan-Downloader.Win32.AutoIt.aa, Worm_UTOTI.AI, W32.SillyDC
Trojan-Downloader.W32.Pendix.d, TrojanDownloader, Possible_DLDER
Trojan-Downloader.Win32.Small.zie, A killer at 11, he's freed at 21 and kill again.
Trojan-Downloader.W32.Agent.xna virus
Trojan-Downloader.JS.Agent.chk and Trojan-Downloader.JS.Agent.ab
Trojan-Downloader.WMA.GetCodec.d, media codec downloader infects mp3 & wma files
Trojan.Dropper.Cutwall.F, Clones: Trojan.Dropper.Cutwail.H, Trojan-Dropper.Cutwail.AK, Trojan-Dropper.Cutwail.AB, Trojan.Dropper.Cutwail.L, Trojan.Dropper.Cutwail.C, Trojan.Dropper.Cutwail.F
Trojan.FakeAlert.Gen.1 gives fake system warning that you need to buy a removal software
Trojan.FakeAlert.Gen.2 gives fake system warning that you need to buy a removal software
Trojan.FakeAlert.Gen.1 also known as Trojan-Spy.Win32.Zbot
Trojan Horse
Trojan Horse Agent Boy Virus is received by visiting malicious web sites.
Trojan Horse Backdoor Virus FVX, remove Uchelp.exe on the flash or thumb drive
Trojan Horse Small Computer Virus, if you right click an icon´ò¿ª(&O) & ×ÊÔ´¹ÜÀíÆ÷(&X)

Trojan Horse Generic11.CLR
Trojan Horse Generic11.OQJ
Trojan Horse IRC Backdoor.SdBot4.FRV
Trojan Horse Proxy virus, look for ClientChecker.exe, PeerAdapter.exe, peerconf.exe
Trojan Horse uninstall.exe
Trojan.Loader.N, Trojan.Kobcka, Trojan-Downloader.Win32.Mutant, Trojan.Pandex,
Trojan Metamorf.C Trojan Horse
Trojan Virtumonde Trojan Horse
Trojan.Banload.74 Trojan Horse
Trojan.Bytesize Trojan Horse
Trojan.Jakposh Trojan Horse
Trojan.Moo Trojan uses the JPEG of Death to infect JPEG file
Trojan.OSX.Jahlav.A, Trojan.OS X.Jalava
Trojan.PWS.Chromeinject.B, Trojan.PWS.Chrome inject.B
Trojan-Proxy.Horst.Gen .
Trojan-Spy.Win32.Ardamax.n, TrojanSpy
Trojan.Qhost.AKR doesn't let the user update BitDefender products
Trojan Qhost .AKG, Win32.Qhost.akg
Trojan.Qoologic Key Logger
Trojan.Rensom.B, Trojan-Ransom.Win32.VB.a, W32.Randsom.A, Win32.Bogoj.B Skype.exe, TrojanSpy
Trojan-Spy.Win32.Zbot also known as Trojan.FakeAlert.Gen1
Trojan.Swizzor.1, Swizzor, FatObfus, LOP, Obfuscated, C2Lop, it starts a new iexplorer.exe
Trojan.Vundo Trojan Horse
Trojan.wavBfly Trojan Horse
Trojan.wavVerify Trojan Horse
Trojan.Wimad Trojan Horse, Trojan.Wimad.Gen.1
Trojan.Win32.Chifrax.a, malicious trojan horse or bot
Trojan.Win32.Delf.aam, Trojan Downloader, associated with Yahoo online services
Trojan.Win32.Pakes.kab, also named Win32.Pakes or Trojan Pakes it is a backdoor Trojan
Trojan.Win32.Agent.tfc is a malicious software that is installed without the users knowledge
Trojan.Zonebac Trojan Horse
TrojanDownloader.xs Trojan Horse
TU-482 is the harmless virus, Virus.DOS.Tu.482, String includes "Tumen.,v2.4;(c)1991"
Tuesday Virus, Patch Tuesday
Tumen V0.5 Virus, Tumen V2.0 Virus, Tumen Virus
Turbo Virus, Turbo 448, @ Virus, Turbo @, Polish-2, Nagytud
T Virus promotes a new console video game.
Twin Peaks Virus,
Twin-351 Virus, Virus.DOS.Twin.351.c, Twin.cmp, TWIN-351
Typo Boot Virus, similar to the Ping Pong virus, Mistake virus
Ucender Virus, Ucender.txt,, ucender.exe
UFO.1465 virus, Virus.DOS.UFO.1468, Univ/g , Ufo.1468, Virus:DOS/Ufo.1468
UFO.1468 virus, Virus.DOS.UFO.1501, Univ/g, Virus:DOS/Ufo.1501, file infector virus
UFRO.A-B is a Boot virus.
UGADAJ.739 virus, Virus.DOS.Ugadaj.739, Univ/a, Bin.Auto.BZP, DOS/Ugadaj.739
Ugly.4575 virus, Virus.Boot-DOS.Ugly.4575,, file infector virus.
Ugly.4575-B is a Boot virus.
Ugly.4893-B is a Boot virus.
Ugly.5854 virus, Virus.Boot-DOS.Ugly.5854,, this is a file infector virus.
Ugly.5854-B is a Boot virus.
Ugly.5920 Virus.Boot-DOS.Ugly.5920, , NoKernel.6000 (2) file infector virus
Ugly.5920-B is a Boot virus.
Ugly.6000-B is a Boot virus.
Ugly.6000.B-B is a Boot virus.
Ugly.6047-B is a Boot virus.
Ugly.6048 Virus.Boot-DOS.Ugly.6048,, Virus:DOS/NoKernel.6048, file infector
Ugly.6048-B is a Boot virus.
Ugly.6047 Virus.Boot-DOS.Ugly.6047,, Virus:DOS/NoKernel.6047, file infection
Ugrad.1145 Virus, Virus.DOS.Ugrad.1145, Univ/f, Virus:DOS/_1145, file infection virus
UGUR Virus, Virus.DOS.Ugur.1297, Trakia.a, Geliyor (2), Virus:DOS/Ugur.1297
UGUR-1, Virus.DOS.Ugur.1297, Trakia.a, Geliyor (2), Ugur, Ugur-1297 file infection virus
Unable to Deliver Email Hoax, "Returned or Unable to Deliver"
Undressed Virus, undres.281, undre.282
Unk Virus infects .COM and .EXE files, including COMMAND.COM.
United Virtualities Persistent Element PIE
UPS Delivery Notice Virus
Uriel Virus, Dropper/Eddie.Uriel, Dark_Avenger.Uriel virus, Eddie.Uriel, Dark_Avenger.1200
Uruk HAI.300 Virus, Virus.DOS.Uruk.300, Univ/c, Uruk-Hai.300 file infector
Uruk HAI.361Virus, Virus.DOS.Uruk.361, file infector
Uruk-Hai Virus, Uruk-Hai.394/427 file infector
US Post Office Email Hoax, the post office is not going to charge postage for emails
USSR Virus Waxes Nostalgic for USSR, Win95.Zhymn, Ussrhymn@m, Trojan "in the wild"
USSR 1049 Virus, Yankee.1049, Yankee 1049.a, USSR.1049.D, YankeeDoodle.1049.A
USSR 2144 Virus related to the Voronezh virus, Hymn.2144, USSR.2144
USSR 256 Virus encrypted computer virus USSR.256
USSR 257 Virus encrypted computer virus USSR.257
USSR 3103 Virus, SVC-3118, SVC-31118.A, SVC USSR.3103
USSR 311 Virus, Virus.DOS.Vienna.311, Vien.Com2Con, Vienna.311, USSR.311
USSR 394 Virus, Attention.394, Attention.394.A USSR.394
USSR 492 Virus, Virus.DOS.V.492, SI-492.A, Virus:DOS/SI_492.A USSR.492
USSR 516 Virus, USSR 516 B Virus, Intended-516, Leapfrog.519, USSR.516
USSR 600 Virus, USSR.600 , USSR.601, Voronezh.600
USSR 696 Virus USSR.696, V 696, V696, ON.696.A
USSR 707 Virus, USSR.707, Quartile.707.A
USSR 711 Virus, Thirteen.A, Thirteen.711.A, Thirteen.699.A
USSR 830 Virus, USSR.830, RedDiavolyata-830 Virus
USSR 948 Virus, USSR.948, Kurgan.1624, Kurgan.939. USSR-948.B

V1028 Virus, Dark_Avenger_1028 spyware, Dark Avenger.Slowdown virus, Slowdown
V125 Virus, Hide lp Ng V1 25 Inc Patch torrent, BitTorrent/6030, peer to peer, P2P
V1463 Virus infects .COM files
V163 Virus, V.163-C Virus, Virus.DOS.Tiny.162.1, SillyRC.163, Virus:DOS/Qtiny.162
V1 Virus, Boot infection, overwrites boot, Emergency Virus Fix V1 torrent
V2 0 Virus, Contra Virus V2.0,
V2000 Virus, darkav-2.rpt, Dark Avenger 3 Virus, V2000, Eddie 3 Virus

V2100 virus, 2100-1 Virus, Dark Avenger-2100, Dark_Avenger.2100.D270x


V270X Virus, Grower virus, 268+ virus
V299 Virus, Kaspersky Anti-Virus v6.0.0.299, PLT-Scheme v299.100
V2P2 Virus, file infector, V2 P2 Virus
V2P6 virus, v2p6.rpt, v2p6.asm, v2p6.asm, v2p6.doc, v2p62.doc, v2p6_.asm, v2p6__.asm

V-351 Virus, Virus.DOS.V.334, Peel.334, Virus:DOS/Peel.334, wrar351.exe
V-388 Virus, Virus.DOS.V.388, SillyRC.388, Virus:DOS/V388.388
V400 Virus, V.400 Virus, Motorola V400 virus, v 400, Plod.400, DOS/V.400.e
V483 Virus, Siskin.483, Gen.483.C, 483 (C) virus, v.483_B
V5 Virus, Vampire V5 Virus, Download Kaspersky Anti Virus Personal v5.0.
V600 Virus, V 600 Virus file infector
V800 Virus, V 800, v800.asm, v800.asm, v800.rpt, V 800 Virus, V.800, Life after death
V801 Virus, v 801 Virus, Macafee V801 patch, Gen.801, V.801,
V82 Virus, V82-4, V8.2.DLL, Phoenix.2000, Phoenix-Trojan
V914 Virus, V 914 virus, v.914, KbrBug.914,
V961 Virus, V.961,
VA virus, Troj/Tibs-VA, VA 100, Trojan VA Virus, V.A virus
Vacsina Virus, Vacsina.TP-05, Vacsina.TP-04, Vacsina 4, Vacsina 5
Valentine Greeting Email Hoax, VALENTINE'S GREETINGS! please delete it
Valentine's Day computer virus, AKA: W32.Yaha.K@mm virus, Vbs_Valentin.A,
Variant Virus,
VBS/IE-Title!C71C71CDCDC Script Virus
VBS/Sinowa-Fam and Clones, VBS/Loveletter, Lovebug, I-Worm.LoveLetter, VBS/LoveLetter.A, VBS/LoveLet-A, VBS.LoveLetter.CN
VCL.716, Chuang, Donatello, Enun, Earthday, Kinison, Venom, Yankee-tune, VCL.Genocide
VCL.Olympic , activates by random after the 12th of February, Date of 1994 Winter Olympics
VCL-HEEvE infects .EXE files
Vcomm Virus, VCOMM OE ERROR 0028:C02A903A DLLnstall.
VCOMM.637, VCOMM.636
VCS Virus Strain, VCS V1.0 Virus, VCS V1.0 Manta Virus
VDV-853 Trojan Horse, Trojan/Worm/Backdoor/VDV.853, VDV.853
Venge E Virus, Vengence virus, Virus.DOS.Vengence.613, Vengence-E
Vera Cruz virus, also called Boot, Bouncing Ball, Bouncing Dot, Italian, Italian-A & Ping Pong
VHP Virus, VHP-2, VHP-348 VHP-353 VHP-367 VHP-435 VHP-757 VHP-776
Victor Virus infects .COM &.EXE files, Victor V1.0 The Incredible High Performance Virus
VideoThang adware adds support for Picasa, Flickr and Photobucket
Vienna.648 Trojan Horse, Trojan/Worm/Backdoor.Vienna.648.a, Vienna.564
Vietnamese Virus, sends a message in Vietnamese in your Yahoo contacts Yahoo email
Violator Virus, file infector, Vienna.Violator and ViolatorStrainB
Viper Virus, ViperDropper, NO CRIPPLE WAREZ HERE!!!
Viperizer B Virus, v-viperz.txt, Strain A, Stingray/VIPER, Vienna Virus Hack
Viral_Messiah Virus, VCL.RedTeam, VCL.716, VCL.Genocide, Pearl Harbour, Heevahava
Virdem Virus, Virus.DOS.VirDem.601, GOL, Univ.prepend, Dewdz
Virflop Virus, Vir Flop Virus, infects .COM and .EXE files
Virus, Viruses, computer virus, Laptop virus, notebook laptop, tablet cirus, desktop virus
Virus constructor creates new viruses without having any programming skills
Virus Dropper drops a virus to the infected computer to execute it
VIRUS-L/comp.virus, Virus-L, comp virus are discussion groups on viruses
VirusProtectPro, AKA VirusProtect, installs Zlob trojan, masquerade as video or audio codecs
Virus Signature File containing the binary patterns of known viruses.
Virus-101.dr, Virus-101, Dropper, V101, Virus-101 Virus, Virus-101.2560
Virus-90 Virus, virus-90.html, Virus90, Trojan/Worm/Backdoor/Virus90, Virus-90.857
Virus:Win32.Alman.b, AKA: Alman.b, infects all executables files, kootkit, PE_MUMAWOW.AS, Virus:Win32/Cekar.H
Virus.WIN32.Virut.n, W32/Virut.gen, PE_VIRUT.D
Virus.W32.Virut.q exe extension infection
Virus.W32.Small.l, IKARUS virus, W32.Madangel, New Win32.g2, PE_MADANGEL.A-O
Virus.W32.Hidrag.a, W32/Jeefo, W32.Jeefo, PE_JEEFO.A, name svchost.exe.
Virus.W32.Virut.b infection, executable file virus, PE_VIRUT.B Virus
Virus.Win32.Neshta.a file infection virus, W32.Neshta.a
Virus.W32.Parite.a, W32.Parfi, W32/Pate.a.dll, PE_Parite.A-O, Win32.Parite.A/BC
Virus.Win32.Parite.b, W32.Pinfi, PE_Pate.b, parastic memory resident virus W32.Parite.b
Virus.W32.Tenga.a, W32.Tenga.a, Tenga.gen, PE_TENGA.A, infects executable file it finds.
Virus.W32.Xorer.du, TR/Drop.Xorer.C
Visual Basic Script, file extension .vbs, active scripting, VBScript, Visual Basic Script Worm
V-Label Virus infects .COM and .EXE files, change of the volume label
VM Virus, W32/Rbot-VM,
Voco Virus, Virus.DOS.VCL.VoCo.745, Univ.ow/a, VCL.745, VCL.O.745, Worf
Vootie Virus, vootie.asm, Virus.DOS.Trivial.Vootie.63, Trivial.63, Univ.ow/a
Voronezh Virus, overwrites the beginning of COM files Voronezh-370, Voronezh-600
Vote/Vote1000 Viruss, Vote.1000, Virus:DOS/Trivialbased.1000,
VP Virus, Autorun VP Virus, Trojan Horse
Vriest Virus, Something's coming up ... high-pitched sound for a few seconds
VTS Trojan Horse, Trojan-GameThief.Win32.Magania.vts
Vulnerability, weakness in a system which allows an attacker to violate the computers integrity
Vundo Trojan, Trojan.Vundo, displays large amount of unsolicited pop-up advertisements.

W13 file infector, Virus.DOS.Vienna.361, Virus:DOS/Trivialbased.1028, Vienna.679
Win32.Ackantta@mm Worm, W32.Ackantta@mm
Win32.Antiman.A@mm, W32.Antiman.A@mm
Win32.Auric.A@mm, W32.Auric.A@mm
Win32.Badtrans.B@mm, W32.Badtrans.B@mm
W32/Caveduck.a, Win32/Caveduck.a
W32/Checkout!91d0b88a worm Win32-Cheakout!91d0b88a worm
W32/Conclicker.worm, Win32/Conclicker.worm
W32/Conclicker.worm.gen.a, Win32/Conclicker.worm.gen.a
W32/Conflicker.worm.gen.b, Win32/Conficker.worm.gen.b
W32.Delezium, W32.Delezium!inf
W32/Greener Virus, Win32-Greener virus
W32/Renocide, Win32/Renocfide
W32/Sdbot.worm!3AFA6720 Internet Worm
W32/Tefo Trojan, Win32/Tefo Trojan
W32/Vote@MM virus, mass emails itself through Outlook, promote peace for US & Islam
W32/Waledac Virus, Win32/Waledac Virus
W32/Xirtem@MM, Win32/Xirtem@MM
W32/Autorun.worm.zf.gen worm , Win 32/Autorun worm.rf.gen 2 worm
Win32.Bagle.A@mm, W32.Bagle.A@mm
Win32.Bagle.AU@mm, W32.Bagle.AU@mm
Win32.Bagle.FO@mm, W32.Bagle.FO@mm
Win32.Bagle.C@mm, W32.Bagle.C@mm
Win32.Bagle.D@mm, W32.Bagle.D@mm
Win32.Bagle.E@mm, W32.Bagle.E@mm
Win32.Bagle.gen Trojan, W32.Bagle.gen Trojan, Trojan
Win32.Bagz.B@mm, W32.Bagz.B@mm
Win32.Bride.A@mm, W32.Bride.A@mm
Win32.Bride.B@mm, W32.Bride.B@mm
Win32.Bride.C@mm, W32.Bride.C@mm
Win32.Brontok.A@mm, W32.Brontok.A@mm
Win32.BugBear.A@mm, W32.BugBear.A@mm
Win32.BugBear.B@mm, W32.BugBear.B@mm
Win32.BugBear.C@mm, W32.BugBear.C@mm
Win32.Dumaru.A@mm, W32.Dumaru.A@mm
Win32.Dumaru.B@mm, W32.Dumaru.B@mm
Win32.Dumaru.C@mm, W32.Dumaru.C@mm
Win32.Dumaru.Y@mm, W32.Dumaru.Y@mm
Win32.Elkern.A, W32.Elkern.A
Win32.Evaman.A@mm, W32.Evaman.A@mm
Win32.Fizzer.A@mm, W32.Fizzer.A@mm
Win32.Frethem.F@mm, W32.Frethem.F@mm
Win32.Fujacks!htm, W32.Fujacks!htm
Win32.FunLove, W32.FunLove
Win32.Ganda.A@mm, W32.Ganda.A@mm
Win32.Gibe.A@mm, W32.Gibe.A@mm
Win32.Gone.A@mm, W32.Gone.A@mm
Win32.Holar.H@mm, W32.Holar.H@mm
W32/Hytoo.worm virus, Win32-Hytoo.worm
Win32.IISWorm.CodeRed.F, W32.IISWorm.CodeRed.F
Win32.Ivrol.A@mm, W32.Ivrol.A@mm
Win32.Jeefo.A, W32.Jeefo.A
Win32.Klez.A@mm, W32.Klez.A@mm
Win32.Klez.D@mm, W32.Klez.D@mm
Win32.Klez.E@mm, W32.Klez.E@mm
Win32.Klez.H@mm, W32.Klez.H@mm
Win32.Lirve.B@mm, W32.Lirva.B@mm
Win32.LovGate.C@mm, W32.LovGate.C@mm
Win32.LovGate.G@mm, W32.LovGate.G@mm
Win32.LovGate.H@mm, W32.LovGate.H@mm
Win32.LovGate.J@mm, W32.LovGate.J@mm
Win32.Lovgate.K@mm, W32.LovGate.K@mm
Win32.Mabutu.A@mm, W32.Mabutu.A@mm
Win32.Magistr.B@mm, W32.Magistr.B@mm
Win32.Melare.A@mm, W32.Melare.A@mm
W32.MFG.Tassos@mm Email Hoax, Win32.MFG.Tassos@mm, no 'removal tool' available
Win32.Mimail.A@mm, W32.Mimail.A@mm
Win32.Mimail.C@mm, W32.Mimail.C@mm
Win32.Mimail.D@mm, W32.Mimail.D@mm
Win32.Mimail.E@mm, W32.Mimail.E@mm
Win32.Mimail.F@mm, W32.Mimail.F@mm
Win32.Mimail.H@mm, W32.Mimail.H@mm
Win32.Mimail.I@mm, W32.Mimail.I@mm
Win32.Msblast.A, W32.Msblast.A
Win32.Msblast.B, W32.Msblast.B
Win32.Msblast.C, W32.Msblast.C
Win32.Msblast.F, W32.Msblast.F
Win32.Muce.A, W32.Muce.A
Win32.Mydoom.b@mm, W32.mydoom.b@mm
Win32.MyParty.A@mm, W32.MyParty.A@mm, Trojan.generic,
Win32.Mytob.c, Trojan.generic, W32.Mytob.c, Worm,
Win32.Mydoom.l, Worm W32.Mydoom.l
Win32.Mytob.t Trojan, W32.Mytob.t, Worm.P2P.generic
Win32.Mytob.u, W32.Mytob.u, Worm.P2P.generic
Win32.Neroma.A@mm, W32.Neroma.A@mm
Win32.Neroma.B@mm, W32.Neroma.B@mm
Win32.Netsky.aa Trojan, W32.Netsky.aa
Win32.Netsky.b Trojan, W32.Netsky.b
Win32.Netsky.c Trojan, W32.Netsky.c,
Win32.Netsky.d Trojan, W32.Netsky.d
Win32.Netsky.r, Trojan, W32.Netsky.r,
Win32.Netsky.q Trojan, W32.Netsky.q
Win32.Netsky.t, Trojan, W32.Netsky.t,
Win32.Netsky.y Trojan, W32.Netsky.y
Win32.Netsky.x Trojan, W32.Netsky.x
W32.Netsky.B@mm W32.Netsky.B@mm
Win32.Nimda.A@mm, W32.Nimda.A@mm
Win32.Nimda.E@mm, W32.Nimda.E@mm
Win32.Novarg.A@mm, W32.Novarg.A@mm
Win32.Novarg.B@mm, W32.Novarg.B@mm
Win32.Nyxem.E@mm, W32.Nyxem.E@mm
Win32.Nyxem.e Trojan W32.Nyxem.e
Win32.Otwycal.c infection Trojan W32.Otwycal.c
Win32.Otwycal.g infection Trojan, W32.Otwycal.g
Win32.Parite.A, W32.Parite.A
Win32.Parite.B, W32.Parite.B
Win32.Parite.C, W32.Parite.C
Win32.Polip.A, W32.Polip.A
Win32.Rootkit.Agent.YFE, W32.Rootkit.Agent.YFE Trojan.generic,
Win32.Scano.gen Trojan, W32 Scano.gen
Win32.Sober.B@mm, W32.Sober.B@mm
Win32.Sober.C@mm, W32.Sober.C@mm
Win32.Sober.D@mm, W32.Sober.D@mm
Win32.Sober.F@mm, W32.Sober.F@mm
Win32.Sober.O@mm, W32.Sober.O@mm
Win32.Sobig.A@mm, W32.Sobig.A@mm
Win32.Sober.AD@mm, W32.Sober.AD@mm
Win32.Sobig.B@mm Palyh, W32.SoBig.B@mm
Win32.Sobig.C@mm, W32.SoBig.C@mm
Win32.Sobig.E@mm, W32.SoBig@mm
Win32.Sobig.F@mm, W32.SoBig.F@mm
Win32.Valhalla.2048, W32.Valhalla.2048
Win32.Worm.Benjamin, W32.Worm.Benjamin
Win32.Worm.Bobax.A, W32.Worm.Bobax.A
Win32.Worm.Bobax.C, W32.Worm.Bobax.C
Win32.Worm.Dabber.A, W32.Worm.Dabber.A
Win32.Worm.Delf.NCZ, W32.Worm.Delf.NCZ
Win32.Worm.Gimmiv.A, W32.Worm.Gimmiv.A
Win32.Worm.Gimmiv.B, W32.Worm.Gimmiv.B
Win32.Worm.Korgo.A, W32.Worm.Konro.A
Win32.Worm.Korgo.B, W32.Worm.Korgo.B
Win32.Worm.Korgo.C, W32.Worm.Korgo.C
Win32.Worm.Korgo.P, W32.Worm.Korgo.P
Win32.Worm.Korgo.R, W32.Worm.Korgo.R
Win32.Worm.Mexer.E, W32.Worm.Korgo.E
Win32.Worm.Mytob.BY, W32.Worm.Mytob.BY
Win32.Worm.Opaserv, W32.Worm.Opaserv
Win32.Worm.McMaggot.A, X.Win32.Worm.McMaggot.A
Win32.Worm.Sohanad.NAK, W32.Worm.Sohanad.NAK
Win32.Worm.Sohanad.NAW, W32.Worm.Sohanas.NAW
Win32.Worm.SQLExp.Slammer.A, W32.Worm.SQLExp.Slammer.A
Win32.Worm.Welchia.A, W32.Worm.Welchia.A
Win32.Worm.Welchia.B, W32.Worm.Welchia.B
Win32.Yahaa.E@mm, W32.Yahaa.E@mm
Win32.Yahaa.J@mm, W32.Yahaa.J@mm
Win32.Yahaa.K@mm, W32.Yahaa@mm
Win32.Yahaa.P@mm, W32.Yahaa.P@mm
Win32.Yahaa.Q@mm, W32.Yahaa.Q
Win32.Zafi.A@mm, W32.Zafi.A
Win32.Zafi.B@mm, W32.Zafi.B
Win32.Zafi.D@mm, W32.Zafi.D

Walkabout virus, Lenny Loosejocks Goes Walkabout,
Walker virus, Walker 1.0, UJHPTTLZ
Wallon Virus wrecks Windows Media Player
Warezov Worm, Worm.warezov, Warezov.AT mass mailing worm with infected attachments
Warez virus, copied pirated software, backdoor, crankz scene malisious software
Warning! Spyware detected on you computer!
Warning! Windows Firewall detected suspicious network activity on your computer.
Warrior Virus, COMM Warrior, The powerfull WARRIOR!
Warrior 2 virus, PC_ Samurai.Warriors.2
WAVE Virus, Beagle multi wave virus, Multi wave attacks,
WAZUP Email Hoax, Attention, new virus!!!! WaZa
WeatherBug adware, ad-supported containing both banner and pop ups, Version 5 and 6
Web Page Virus, .Web Site Virus
Welchia Virus, W32.Welchia.Worm, WORM_MSBLAST.D, uses TCP port 135.
Welcome to the matrix Email Hoax, "WELCOME TO THE MATRIX.PPS"
Whale Virus, Whale computer virus, MotherFish StealthVirus ZTheWhale virus, address 9D90
Wharps Virus, Wharps.572d, Virus.DOS.Wharps.a, Wharps.572e, Wharps.572
WhoCares virus, SillyC.181, SillyC.181.A, CVDL SillyC.181
WhenU adware, AKA SaveNow, WhenU sends bogus search results to search engines
Wilbur 3 virus, Wilbur-512c, Wilbur-512.C, Wilber.C
Wild Thing A Virus, Wildthing.dr, Dropper, WILD-THING-2, Danish_tiny.Wild_Thing.2
Willistrover III virus, AKA: Tracker, SP, PHX.965, COM and EXE infector, PHX strain
Willow virus, Willow.1870, Willow.2013, MUMMY-4, Willow 2 virus,
Win a Holiday Email Hoax, email titled "WIN A HOLIDAY" Do not open it.
WinAce adware, MeMedia AdVantage
WinAble virus, WinAntiSpyware2007FreeInstall.exe popup, winable.exe, winble.exe
Windmill Virus, BtDr.Windmill, Boot dropper virus,
Windows has detected spyware infection!
WindowsAntivirusPro, Windows Antivirus Pro
WinFixer adware, WinAntivirusPro; Amaena, prompts user to purchase anti virus program
WinSession Logger
Winvir virus, "Virus_for_Windows v1.4" and "MK92". Win/WinVir.686, Winvir.Drp,
WinWebSecurity2008 Adware
Winzix adware, .zix file format. UnZixWin
Wisconsin virus, Death to Pascal, targets Pascal programs
Wizard 3.0 virus, "I'm WIZARd 3.0",
Wobbler Email Hoax, "Wobbler" or "Californi" "californi.exe",
Wolfman virus, CVDL Yankee.Wolfman, Wolfman.2064, Wolfman.2064.A
Wonder Virus, Virus.DOS.HLLO.Wonder, HLL.ow.7424c, WONDER-2, HLLO.Gen
Word Atom Macro, Underground MS Word 6.x Macro Viruses FAQ V2.0
Word Color Macro, uses WordBasic macro language to replicate themselves
Word Concept Macro, Concept, DMV, Nuclear, Colors, FormatC, Hot, Winword Macro
Word Hot Macro, WordMacro/Hot, QLHot=35112, WINWORD6.INI file
Works Email Hoax, This virus warning is genuine.
Wordswap virus, WordSwap-1069 WordSwap-1085 WordSwap-1387 WordSwap-1503

World Peace virus, Bang For World Peace is a mini-viral site, advertising popups
Worm.VBS.Headtail.a, VBS/Nauj.A, VBS_INVADESYS.AN, Visual Basic Script worm Trojan
Worm.Win32.Fujack.k, Net Worm, Trojan Downloader, Worm:W32.Fujack.k
Worm.Win32.Mabezat.b, W32/Mabezat.a, Win32/Mabezat.A, W32/Mabezet.b
Worm.Win32.NetSky.aa Trojan
Worm.Win32.NetSky.b Trojan
Worm.Win32.NetSky.d Trojan
Worm.W32.NetSky.q Trojan
Worm.W32.NetSky.y Trojan
Worm.W32.NetSky.x Trojan
Win32.Scano.gen Trojan
Worm.Win32.Nyxem.e Trojan
Worm.W32.Otwycal.c infection Trojan
Worm.W32.Otwycal.g infection Trojan Trojan.generic

Worm is a virus that can rum itself, self-replicating computer program
Wow.VM Trojan Horse, Infostealer.Wowcraft, password stealer for World of Warcraft
Wsnpoem, Trojan.Wsnpoem, Malware Description Win32, Win32.Agent.pz
WTC Survivor Email Hoax, BIG TROUBLE !!!! Do not open "WTC Survivor"
WWT Virus, overwriting viruses, access to BBS
X-1 virus, X1.exe, Winkiller.A trojan, "You are infected with X1 VIRUS." X-2 virus, X2 X1
Xalan Email Hoax, displays "XALAN" on the screen
X-3A virus, X-3A.txt, X-3a, X-3a.A, X-3a.ABootimage, X-3A dropper
X-3a.B Virus, X-3a.BBootimage virus, X-3B virus
X77 virus, Virus.DOS.G2-based,, Univ/o file infector
Xabaras virus is a file infector, Virus.DOS.Xabaras.1972, Virus:DOS/Leprosy_Xabaras
XP-695970A6 virus, Worm.P2P.Generic sometimes found in C:/Windows
Xpeh Virus, Xpehbam Dialer,
XTAC virus, "good news! you have just been smitten by XTAC - lyndon siao, usc-tc"
XXX Toy adware, XXX Shop Online adware
Xuxa virus, Xuxa.1656, CVDL Xuxa1656, Xuxa.1088, Xuxa 1096, Xuxa.1045, Xuxa.1405
Yale Virus, AKA: Alameda Virus, Merritt Virus, Peking Virus & Seoul Virus
Yan2505a s, Virus.DOS.Yankee.2505, YD.2505, Yankee.2505, YAN2505A, Yankee.2505
Yankee virus, AKA: Old Yankee virus, at the end of the virus "motherfucker" appears
Yankee Doodle
Yankee – 2 file infector, VCL Yankee 2 virus, VCL-3, Oldyank.1624, Yankee.2
Yap virus, AKA: BlackJack, Falling Letters, Cascade, Cascade-17Y4, Jo-Jo
Y2KGame Email Hoax, Y2K Game, green diamond icon with the letters 'NVD'.
Your computer is infected pop up with a blinking red X in the bottom right of my screen
Your Computer Might Be At Risk, popup error message, Popup in Windows XP SP2
Your Friend D@fit Email Hoax, being replaced by "scoutshacker".
Your Privacy is in Danger, red background, desktop hijacker, changes Windows wallpaper
Youth Virus, CVDL, Youth.563, Youth.580, Youth.580.640
Yukon Virus, Displays "Divide overflow"
Z10 Virus, PS-MPC.Z10 virus, z10-d.asm, z10.asm, z10_a.asm, z10_b.dsm, z10_b.dsm
Zafi virus emails infected attachments, copies itself winamp 7.0 full_install.exe
Zak2 virus, ZAK2.EXE, Zak2 torrent, ZAK2.BAT
Zango adware, Zango displays popup advertisements
Zango.Toolbar is an adware application that installs a browser helper object, BHO
Zaragosa virus, Caz virus, Virus anti-McAfee v1.0 (C) Septemper 1991 Made in Spain
ZBot Trojan,, TR/Spy.Zbot.AD.1, %System%\ntos.exe file
Zeppelin virus, zeppelin.asm, John "back-beat" Bohnam, "WEAK-DICK" Virus was made!
Zero Bug virus, Palette, marks infected files like the Vienna virus, places 62 in seconds field
Zero Time virus outbreak protection, Zero Hour AV, Server side polymorphic virus
ZeroHunt virus, Zero Hunt Virus, AKA: Minnow, Minnow-1 Virus, ZeroHunt-411, 415
Zhelatin Worm spreads in emails with war related subjects & attachments video.exe movie.exe
Zindos virus spreads through a backdoor that is created by mass-mailer worm
ZK900 Virus, CVDL Npox.900.A, Funeral.900, Virus.DOS.Funeral.900.b
Zlob Trojan Horse is a backdoor Trojan that allows remote attackers in
Zlatko Email Hoax, titled " ZLATKO " by email in a file " Zlatko.exe ".
ZMist Virus, W32/Zmist.a, Zombie.Mistfall
Zotob Virus AKA: WORM_ZOTOB, exploits Microsoft security hole copies itself Botzor.exe
Zoda Virus, Zona Virus
Zombie Virus it can be activated remotely to send out fake emails.
Zoo Virus, Zoo.p0rn virus
ZRK Virus, Trojan-PWS.OnlineGames.ZRK
ZU1 Virus, Virus.DOS.Zu.473.a,, Hungarian.473, Virus:DOS/Hungarian.473
Zwinky adware, a non-animated cardboard cutout-like character,


Our national network of IT technicians and engineers can effectively deploy a national rollout or service a distant office.
3 Geeks and a Mouse's National Account Manager is here to assist you! We will provide you with the best technicians for your problem and enable you to limit your number of contacts to one. We can help you effectively control costs, timing and quality of your deployment in one office or nationwide.
How may we assist you?

1 3 Geeks and a Mouse eliminates the frustration out of home computer repair. No more unplugging everything and trying to remember which wire goes where. We come to you. On your schedule.
Many of our technicians and engineers have certifications such as MCSE, MCP, CCNA, and A+.
Customer satisfaction is our #1 goal. Let us earn your business and trust.
1 Whether your an Fortune 500 company, a small business owner or you have a home office, 3 Geeks and a Mouse has the right solution for you. Call the professionals at 3 Geeks and a Mouse to keep your server, network and computers running at their optimal speed, leaving you to running your business, not an IT department. Our service manager will send the best qualified technician for the job. Many of our technicians and engineers have certifications such as MCSE, MCP, CCNA and A+. Let us earn your business.
Alabama ( AL ) Computer Repair Louisiana ( LA ) Computer Repair Ohio ( OH ) Computer Repair
Arizona ( AZ ) Computer Repair Maine ( ME ) Computer Repair Oklahoma ( OK ) Computer Repair
Arkansas (AR ) Computer Repair Maryland ( MD ) Computer Repair Oregon ( OR ) Computer Repair
California ( CA ) Computer Repair Massachusetts ( MA ) Computer Repair Pennsylvania ( PA ) Computer Repair
Colorado (CO ) Computer Repair Michigan ( MI ) Computer Repair Rhode Island ( RI ) Computer Repair
Connecticut ( CT ) Computer Repair Minnesota ( MN ) Computer Repair South Carolina ( SC ) Computer Repair
Delaware ( DE ) Computer Repair Mississippi ( MS ) Computer Repair South Dakota ( SD ) Computer Repair
District of Columbia ( DC ) Computer Repair Missouri ( MO ) Computer Repair Tennessee ( TN ) Computer Repair
Florida ( FL ) Computer Repair Montana ( MT ) Computer Repair Texas ( TX ) Computer Repair
Georgia ( GA ) Computer Repair Nebraska ( NE ) Computer Repair Utah ( UT ) Computer Repair
Hawaii ( HI ) Computer Repair Nevada ( NV ) Computer Repair Vermont ( VT ) Computer Repair
Idaho ( ID) Computer Repair New Hampshire ( NH ) Computer Repair Virginia ( VA ) Computer Repair
Illinois ( IL ) Computer Repair New Jersey ( NJ ) Computer Repair Washington ( WA ) Computer Repair
Indiana ( IN ) Computer Repair New Mexico ( NM ) Computer Repair Washington ( DC ) Computer Repair
Iowa ( IA ) Computer Repair New York ( NY ) Computer Repair West Virginia ( WV ) Computer Repair
Kansas ( KS ) Computer Repair North Carolina ( NC ) Computer Repair Wisconsin ( WI ) Computer Repair
Kentucky ( KY ) Computer Repair North Dakota ( ND ) Computer Repair Wyoming ( WY ) Computer Repair