Trojan Key Permissions

This exploit checks for incorrect permissions on several keys that may allow attackers to use a Trojan horse to capture usernames and passwords.

The Trojan Registry Keys List lists the registry keys that Internet Scanner checks for Trojan horses.