Description

The remote host seems to be infected with a trojan horse. A trojan horse comes at least in two parts: a client and a server. The client is used by the hacker to connect to the victim' s machine. Once the server is installed on the victim's machine the hacker has full access to the victim's machine.

Remediation

Check references for detailed information on removing this trojan horse.

References

Related Vulnerabilities