Use your computer fearlessly.




Mission Services Articles Research





Trojan Hunter


Obtain digital forensics at a known price.


Trojan Hunter : License and Instructions

License

By using the Trojan Hunter, you are agreeing to the following license agreement.

The Trojan Hunter is provided as-is with no warranty or guarantee. Intrepid Net Computing is not liable for harm if you deviate from the instructions provided. Intrepid Net Computing is not responsible for delivering digital forensics if you deviate from the provided instructions.

By using the Trojan Hunter, you agree not to disassemble or reverse-engineer the proprietary process that is used for the Trojan Hunter. You agree to respect any and all patents, patents in progress, and trade secrets related to the Trojan Hunter.

You will not transfer the Trojan Hunter to a third party. You will not re-sell the Trojan Hunter.

Instructions

The Trojan Hunter can only be plugged into a single computer.
  1. Select the computer that seems most likely to have a Trojan. This computer can have any operating system and can be a laptop, a desktop, a server, or a router.
  2. Plug the brand-new Trojan Hunter into a USB port on the selected computer.
  3. In your file manager, navigate to the USB drive and open license.txt. (On Mac OSX, you may need to navigate to "devices".)
  4. Close license.txt and do nothing else while you wait. The Trojan Hunter will operate automatically.
  5. Leave the Trojan Hunter plugged in for 10 minutes.
  6. After 10 minutes, unmount and unplug the Trojan Hunter.
  7. Fill out and print the return ticket (found below). Please look up your the full version of your operating system.
  8. Mail the Trojan Hunter and the return ticket to:
    Intrepid Net Computing
    P.O. Box 606
    Dillon, MT 59725-0606
    United States
Use the Trojan Hunter on only one computer.
Never store files on the Trojan Hunter.

Return Ticket

We will use your email address to send you the results of the Trojan Hunter. By mailing us the return ticket, you are opting-in to receiving the results.
First Name
Last Name
Email
Computer Operating System & Version



More Explanations

The Intrepid Method for Security
The Scientific Approach
Formalized IT
Why Clean-Up Hacking?
Rapid Containment of Intrusions

Updates Do Not Provide Security

More Articles



We provide you with customized security that lives up to our intrepid standards (please see the FAQ for details).




INC Logo




What Is New? | Contact | Tips


© 2015, 2016, 2017, 2018 Intrepid Net Computing. All rights reserved.