quote:
Just send the file <removed> to someone in your MSNlist.
When this person opens the file, he or she will go offline for a few secconds and then come online again.
At the moment she or he comes back online again, you can start messing around with him/her.
theres a quote from the read me, it only works by sending that file to the victim,proving its a trojan, for everyone actually running the file...umm , dont? the whoole point of the file is that it will run processes that should allow you to type al lthe commands it has in whatever window the infected victim is in, basically it works like all those really big ones like Sub7 and ProRat so if you run it...EVERYONE that knows the commands for this thing will be able to use all of those commands on you and probably be able to do alot more if they have the knowledge