Home | About Us | Contact Us | Threats to your Security on the Internet | Products | Support | Online Store |
|||||||
RCT's & RAT's What are they? How do I detect them? How many are there? What ports do they use? How do I Remove? Acid Shivers Acid Shivers (modified) Back Orifice Baron Knight Big Gluck Blade Runner Bugs Deep Back Orifice Delta Source Devil Doly Trojan Deep Throat Deep Throat v2 Executer v1 Executer v2 Girlfriend Hack 'a' Tack Master's Paradise NetBus NetBus 2 Pro NetSphere Sockets 'de Troie SubSeven (Sub7) Whack-a-mole (NetBus) WinCrash Additional Resources Latest News Recommended Books Recommended Links Recommended Software |
IMPORTANT NOTICE Please note that the ICQ Software, as most Internet applications, is vulnerable to various security issues and hence should be considered insecure. By using the ICQ Software and the Internet in general, you may be subject to various risks, including among others: * Exposure to objectionable material and/or parties, including without limitation, contaminated files. * Unauthorized invasion of your privacy during, or as a result of, your or another's use of the system. * Spoofing, eavesdropping, sniffing, spamming, breaking passwords, harassment, fraud, forgery, "imposturing", electronic trespassing, tampering, hacking, nuking, system contamination including without limitation use of viruses, worms and Trojan horses causing unauthorized, damaging or harmful access and/or retrieval of information and data on your computer and other forms of activity that may even be considered unlawful. * Unauthorized exposure of information and material you listed or sent, on or through the ICQ system, to other users, the general public or any other specific entities for which the information and material was not intended by you. If you do not wish to be subjected to these risks, you are advised not to use the ICQ Software. Furthermore, please do not use the ICQ Software for "Mission Critical" or "Content Sensitive" applications and purposes. For the purpose of this section "Mission Critical" applications and purposes shall mean applications and use that may result in damage; "Content Sensitive" shall mean any information or data you do not wish to be freely accessible and generally available to Internet users. What do you think of the highlighted text? |
||||||
©
Copyright Commodon Communications. All rights reserved. |