- First Choice for Newbies
- Trojan Remover
(free for 30 days)
- Trojan Remover was written to aid in the removal of Trojan Horses from a computer where standard anti-virus software has either failed to detect the Trojan Horse or is unable to effectively eliminate it. In no way should it be considered as an alternative to regularly using good anti-virus software to protect your computer. Trojan Remover was written specifically to carry out such a removal without the user having to manually edit system files, including the Registry. The program also removes the additional system modifications some Trojans carry out which are ignored by other Virus and Trojan Scanners.
- Highly Recommended for Newbies as well
- TrojanHunter (free for 30 days)
- TrojanHunter searches for and removes trojans on your system. It uses powerful scanning techniques such as file, memory, registry, port and ini-file scanning to locate trojans on your system. Rule files are easily updated with the LiveUpdate utility, and on top of this, the user interface is user-friendly!
- For power users
- DiamondCS TDS-3 (free for 30 days)
- First released in 1997, TDS (Trojan Defence Suite) is one of the longest established anti-trojan programs in existence and today is widely considered to be the most powerful and comprehensive anti-trojan program by the Internet security community. It is the only anti-trojan program that has free daily database updates and is the only anti-trojan program supported by a fulltime team of dedicated internationally recognised anti-trojan professionals including Wayne Langlois, Gavin Coe and Jason Annice. You can even talk to them at the forum!
Trojans are malicious programs often used by hackers to attack target computers, usually to provide a backdoor into the system but sometimes just to cause destruction. Remote Access Trojans (RATs) are the most famous class of trojans and they usually come in two parts - a server that is sent to infect the victim, and a client that the hacker uses to connect to the server after the victim is infected. There are many ways that hackers can use to infect a target with a trojan, and careful security measures aren't always enough - a strong anti-trojan program is also recommended.
Leading anti-virus systems are good at detecting viruses, but relatively poor at trojan detection. Anti-trojan software detects trojans that have been confirmed as un-detected by any anti-virus programs. One reason for this is that anti-virus researchers have a lot more to deal (such as over 50,000 viruses!) so they must limit how much time they spend on anti-trojan research. This is not the case with full-time trojan scanners. That is why we recommend anti-trojan software when needed.