CLICK-THE IMAGE
if you DARE
OR
For in-depth information:
|
You can also try
Junkbusters | Security Space | WebWasher
For instant checks of your Mac or PC
Macintosh Users:
"The list of Trojan horse ports is generated from the standard Unix Trojan list. To date, no Trojan horse applications that create TCP/IP connections have been detected on Macintosh computers but due to their popularity in the hacker community and that Mac OS X is derived from BSD Unix, it's only a matter of time. If and when Macintosh specific Trojan horse applications are identified, this list will be replaced with a more specific list of Trojan horse ports." (Symantec)
Is your ##86 PC wide open?-- try Gibson Research's excellent prober
or try
|
|
Mojave & Intel iMac i5 27" |
|
|||||||
---|---|---|---|---|---|---|---|---|
|
||||||||
Steve |