Executable files may, in some cases, harm your computer.
Therefore, please read below to decide for yourself whether the Trojan on your computer is a Trojan that you should remove, or whether it is a file belonging to the Windows operating system or to a trusted application.
The program is also able to scan Zip files, Rar files and binded executables, since Trojans could easily hide in any of these components.
If you suspect that your computer might be at risk, you can use one of the five built-in tools to identify the source: Process Viewer (similar to the process section of the Windows Task Manager, allowing you to terminate or get a detailed view of the processes that are running on your system), Mem String (which shows you the processes along with the PID and path), Auto Start Explorer, which lets you know what applications automatically launch themselves when Windows Starts, Netstat Viewer (which provides information about the network activity), and the Window list (this component shows you the windows that are created after installing applications on your computer; it includes the class name and title, as well as an icon that shows whether the window is currently hidden or visible.
Each of them has a short description, so that you are well informed on the potential danger.
This feature is useful when you're performing a system scan, and the program finds Trojans that you don't know anything about.
Of course, it's recommended that you scan the entire hard disk, but if you've recently been surfing the web, and want to scan the downloaded files, you won't have to go through the trouble of scanning the entire drive.
The Trojan Hunter Guard does just this - scans files and folders in the background, and monitors your activity so that no dangers might threaten you.can still be freely posted If you wish to announce an update to one of the definition files covered in the above list, post a notice to this thread and the master list will be edited accordingly. If you want your application to be added to this list, please post your suggestion in this thread along with the appropriate links to the software, its definition files, and a brief explanation for our consideration. Trojans are not able to replicate themselves, but their effect can be catastrophic: they can retrieve personal information such as usernames and passwords, and send it to the "developer". It's time to call in the Special Forces to take care of this menace, and Trojan Hunter is an application that will do this for you.It's only specialized in finding and removing Trojan threats on your computer, and is not a complete antivirus solution.