CA (Final) & CS (Executive) Student
2430 Points
Joined September 2007
ya its true..some of the trojens and remote access systems are build to search IPs and then they try to find the injection hole...so tht they can access ur computer...the best way for safety from them is to install antivirus with internet security..