About trojan, spyware rootkits

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by bras33, Oct 23, 2011.

  1. bras33

    bras33 Private E-2

    Hello, I do not need help. I did not know where to post it. I need some information about how Trojan, spyware or rootkits work. I need to know how they work. When someone infected your computer with one of these and if I had access to this person's computer, what must I be looking for? Is there a program that controls them, or he doesn't need one? If he infected my computer can he access it from any other computer? Can this person know the windows login password and/or the bios password with these infections? Can I have a elaborate answer for each one of these infections? Thanks.
     
  2. thisisu

    thisisu Malware Consultant

    Hi bras33,

    There are books full of information on what you are looking for.
     
  3. bras33

    bras33 Private E-2

    Well I don't have those books. I tried online with no success
     
  4. thisisu

    thisisu Malware Consultant

    Try Barnes and Nobles. There are some books there with 400+ pages on what you are looking for.
     
  5. bras33

    bras33 Private E-2

    Thanks
     
  6. thisisu

    thisisu Malware Consultant

    You're welcome.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds