CA (Final) & CS (Executive) Student
                
                   2430 Points
                   Joined September 2007
                
               
			  
			  
             
            
              ya its true..some of the trojens and remote access systems are build to search IPs and then they try to find the injection hole...so tht they can access ur computer...the best way for safety from them is to install antivirus with internet security..