www.seminarios.com.br
|
|
|
|
Name: | gatoril | E-Mail: | badgirl44hotmail.com | Homepage: | http://topusa.co.cc/buy-viagra | Time: | 08/10/2008 at 1:15pm (UTC) | Message: | hi there, buy porn viagra, dre, buy tramadol online, :-(((, |
Name: | dongo | E-Mail: | renghator345yahoo.com | Homepage: | http://topusa.co.cc/buy-soma | Time: | 08/10/2008 at 11:21am (UTC) | Message: | good site, buy generic ultram, , buy cod soma, =-]], |
Name: | coder | E-Mail: | jxl887mymail.com | Homepage: | http://topusa.co.cc/tramadol-hcl | Time: | 08/10/2008 at 9:32am (UTC) | Message: | great site, tramadol hcl 50, 754242, tramadol online discount cheap, 4020, |
Name: | ruffdk | E-Mail: | ymtmvqjmuylz.com | Homepage: | http://cqywyscoxjwf.com/ | Time: | 08/09/2008 at 12:18pm (UTC) | Message: | gf2UBN <a href="http://bklvsalwxepm.com/">bklvsalwxepm</a>, [url=http://aaswhvepiwqw.com/]aaswhvepiwqw[/url], [link=http://kdlvyfpnmwee.com/]kdlvyfpnmwee[/link], http://dctsccinoudv.com/ |
Name: | oviijin | E-Mail: | tusywhgvphmr.com | Homepage: | http://hhesnwhywpkw.com/ | Time: | 08/07/2008 at 6:15pm (UTC) | Message: | CCJluu <a href="http://nbuprabjkxcz.com/">nbuprabjkxcz</a>, [url=http://ubyuqkierclq.com/]ubyuqkierclq[/url], [link=http://qwyldgsoizwi.com/]qwyldgsoizwi[/link], http://tcefkaadisuq.com/ |
Name: | Alex Rojer | E-Mail: | qatroymail.com | Homepage: | http://good-spyware.freehostia.com | Time: | 07/28/2008 at 7:28am (UTC) | Message: | <a href="http://good-spyware.freehostia.com/">Spyware</a> - the so-called spyware modules collect any
confidential information
Browser Hijack - modules, which are aimed at changing some components of the browser - to change the start
page, installing a proxy server, adding references in the "favorite", installation toolbar (toolbar), etc.
Trojan Horses - "Trojan horses" or "logic bombs". "Troyan" on a computer can perform totally different
things from the most harmless to dangerous. For example, he may nominate a CD-ROM, forcing arbitrarily move
the mouse around the screen, show a message with obscene curse word. At this effect "trojan" does not end -
it can steal, delete or modify files, etc. However, the possibility of the virus depends on the imagination
well, it has sent.
Usually "Trojan horse" does not operate in isolation, and attached to any program, like internat.exe. One
of the varieties "trojans" is intended for remote administration. Typically, these "horses" are composed of
two parts: the server and client. One half of "Trojan" remains with the hacker, while another victim is
sent. When the virus is activated on the remote machine, the level of network security falls to zero, since
such a computer is entirely at the mercy of detractors.
There are also "Trojan horses", collect passwords from your computer and sends them to the specified
address. The most popular way to disseminate the Trojan - by mail. |
Name: | gendo | E-Mail: | g.gendoyahoo.com | Homepage: | http://nexusline.net/rus01 | Time: | 07/09/2008 at 10:35pm (UTC) | Message: | Hi! Please visit my site -
http://nexusline.net/rus01
Best regard! |
|
Today, there have been 8 visitors (9 hits) on this page! |
|
|
|
|
|
WWW.SEMINARIOS.COM.BR |
|
|
|