Home | About Us | Contact Us | Threats to your Security on the Internet | Products | Support | Online Store

RCT's & RAT's
What are they?
How do I detect them?
How many are there?
What ports do they use?

How do I Remove?
Acid Shivers
Acid Shivers (modified)
Back Orifice
Baron Knight
Big Gluck
Blade Runner
Deep Back Orifice
Delta Source
Doly Trojan
Deep Throat
Deep Throat v2
Executer v1
Executer v2
Hack 'a' Tack
Master's Paradise
NetBus 2 Pro
Sockets 'de Troie
SubSeven (Sub7)
Whack-a-mole (NetBus)

Additional Resources
Latest News
Recommended Books
Recommended Links
Recommended Software

ICQ's "End User Agreement"


Please note that the ICQ Software, as most Internet applications, is vulnerable to various security issues and hence should be considered insecure. By using the ICQ Software and the Internet in general, you may be subject to various risks, including among others:

* Exposure to objectionable material and/or parties, including without limitation, contaminated files.

* Unauthorized invasion of your privacy during, or as a result of, your or another's use of the system.

* Spoofing, eavesdropping, sniffing, spamming, breaking passwords, harassment, fraud, forgery, "imposturing", electronic trespassing, tampering, hacking, nuking, system contamination including without limitation use of viruses, worms and Trojan horses causing unauthorized, damaging or harmful access and/or retrieval of information and data on your computer and other forms of activity that may even be considered unlawful.

* Unauthorized exposure of information and material you listed or sent, on or through the ICQ system, to other users, the general public or any other specific entities for which the information and material was not intended by you.

If you do not wish to be subjected to these risks, you are advised not to use the ICQ Software. Furthermore, please do not use the ICQ Software for "Mission Critical" or "Content Sensitive" applications and purposes. For the purpose of this section "Mission Critical" applications and purposes shall mean applications and use that may result in damage; "Content Sensitive" shall mean any information or data you do not wish to be freely accessible and generally available to Internet users.

What do you think of the highlighted text?

    © Copyright Commodon Communications. All rights reserved.