AOpen AOpen is a Taiwan based manufacturer specializing in computing solutions for both home and business applications along with hardware and software services for digital signage. The company has a global reach and is a subsidiary of the Wistron Corporation. It was founded in 1996 and boasts of government agencies, leading IT companies and financial services organizations as […]
AMAX Information Technologies
AMAX Information Technologies AMAX is known globally as a technology architecture consulting company; it is well known for providing custom IT solutions to meet specific needs of its clients. Its expertise particularly revolves around the x86 technology; the company uses this expertise to provide high performance computing solutions to its clients all over the world. […]
Aleutia
Aleutia Aleutia Computers Ltd is a London based computer manufacturer known for its low power consuming desktop and server computers. It all started for Aleutia when its founder designed a fan-less energy efficient computer for school children in Ghana. The company has since followed the design principle of ‘low power consumption and no moving parts’ […]
ABS Computer Technologies
ABS Computer Technologies ABS Computer Technologies is one of the leaders in providing computing solutions. It was established in 1990 as an IT system integrator by its parent organization Newegg.com Inc. to provide the finest PC solutions. Having worked with the leading computer components and software companies such as Intel, AMD, NVIDIA and Microsoft Corporation,ABS Computer Technologies […]
Win32.Vapsup.nyl
Win32.Vapsup.nyl Win32.Vapsup.nyl is a malware that changes its name frequently to avoid detection. It is generally very tough to detect this malware in a system. The malware affects the registry of the system and leaves it dysfunctional. The numerous problems it creates with the system can give users a hard time to even switch on […]
Trojan.Fotomoto.A
Trojan.Fotomoto.A Trojan.Fotomoto.A is a Trojan which is used to temper with system security settings. Trojan.Fotomoto.A establishes contact with an internet server after affecting a system. It transfers the gathered information from the system to a remote server and also receives new instructions. The information includes the date the infected system was added to the database […]
ExtenBro.AK
ExtenBro.AK ExtenBro.AK is Trojan which will revise the registry entries and files without the user’s consent. This can lead to a change in the desktop background, System Language Homepage Preferences and Search Engine Preferences. The browser is redirected to certain unwanted websites and cause great deal of frustration for the user. Spam emails, pornographic websites […]
Backdoor.IRCBot.SC
Backdoor.IRCBot.SC Backdoor.IRCBot.SC is a virus with high damage potential. It is one of the sophisticated viruses that first create a thread to check if it is being debugged by a user level debugger. It copies itself into the Windows system directory as a windows service with the name “wgareg”. Since it registers as a Windows […]
Win32.Trafrox
Win32.Trafrox Win32.Trafrox is a virus that can cause high damage to the infected system. As soon as it infects the system, the virus starts executing its code. It copies the files inside the System folder and denies user access by flashing Administrator Consent Required to Access messages. The virus creates a registry value called “services” […]
Backdoor.Cmder.L
Backdoor.Cmder.L Backdoor.Cmder.L is a virus that is spread by the carrier Trojan. It comes as a dynamic link library (dll) file; the virus divides itself into 3 parts for carrying out different functions. The three functions allocated to the 3 parts are WorkOne, WorkOne_t and SecondWork. WorkOne usually makes sure the virus successfully copies itself […]