Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


Just Done My First On Line Scan ......

  • Please log in to reply
No replies to this topic

#1 mypenry


  • Members
  • 211 posts
  • Location:Thailand
  • Local time:12:45 AM

Posted 22 September 2006 - 08:08 AM

HI , Ive just done my first on line scan, ( Panda) and its found this .............
Your computer is infected by Processor?
Keep in mind that Processor is not really a virus but a Hacking Tool. So make sure that your Panda solution detects and removes this type of threat. For more detailed information, check the comparative table on Panda Products.
Common Name .... Processor

Technical name: .....Application/Processor
Type ... Hacking Tool
Effects ....
It gathers information and interacts with the processes that are being run, it allows running processes to be viewed, closed, ended and suspended, and it permits process priority and affinity to be changed. It can be locally or remotely run.

Processor is a hacking tool. Though these programs are legitimate and useful tools when they are appropriately used, a hacker could take advantage of them in order to carry out malicious actions.
Processor is a command line application that can be locally or remotely run, as it is compatible with Telnet Server (tlntsvr).

Processor gathers information and interacts with the processes that are being run in the affected computer. It permits running processes to be viewed, as well as their owners, set of permissions, CPU time, creation time, etc.

Additionally, Processor allows processes to be ended or closed and to be suspended or resumed later. It also permits process affinity and priority to be changed.
Processor does not pose a risk by itself, but it can be used with malicious intentions

Ive run a full scan with the following , but they did not find the item...

Spybot S&D
ewido 4 ( paid )

as a ' newbie ' can some one please tell me what I have to do next...? your comments and advice most welcome

.............. Mypenry

BC AdBot (Login to Remove)


0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users