If you already have the casino installed and was installed prior to January of this year from what I have researched should be ok.For those of you who think oh its just malware well ummm read the following: <table align="center" frame="border" width="460" cellpadding="4" summary="Signature Detection Mapping" cellspacing="4" border="2"><a>winnow.malware.35001</a>1272651167.onlinevegascasino.exe...04/30/10a-squared[Trojan-Banker.Win32.Banker!IK]AntiVir[GAME/Casino.Gen]eSafe[Win32.Banker]Ikarus[Trojan-Banker.Win32.Banker]Sunbelt[Trojan.Win32.Generic!BT] Trojan horses are designed to allow a <a href="wiki/Hacker_(computer_security)" title="Hacker (computer security)">hacker </a> remote access to a target computer system. Once a Trojan horse has been installed on a target computer system, it is possible for a hacker to access it remotely and perform various operations. The operations that a hacker can perform are limited by user privileges on the target computer system and the design of the Trojan horse.Operations that could be performed by a hacker on a target computer system include:Use of the machine as part of a <a href="wiki/Botnet" title="Botnet">botnet </a> (i.e. to perform <a href="wiki/Spam_(electronic)" title="Spam (electronic)">spamming </a> or to perform <a href="wiki/Denial-of-service" title="Denial-of-service">Distributed Denial-of-service </a> (DDoS) attacks)<a href="wiki/Data_theft" title="Data theft">Data theft </a> (e.g. passwords, credit card information, etc.)Installation of software (including other malware)<a href="wiki/Uploading_and_downloading" title="Uploading and downloading">Downloading or uploading </a> of filesModification or <a href="wiki/File_deletion" title="File deletion">deletion of files </a><a href="wiki/Keystroke_logging" title="Keystroke logging">Keystroke logging </a><a href="wiki/Screen_scrape" title="Screen scrape">Viewing the user's screen </a>Wasting computer storage spaceCrashing the computerTrojan horses require interaction with a <a href="wiki/Hacker_(computing)" title="Hacker (computing)">hacker </a> to fulfill their purpose, though the hacker need not be the individual responsible for distributing the Trojan horse. In fact, it is possible for hackers to scan computers on a network using a <a href="wiki/Port_scanner" title="Port scanner">port scanner </a> in the hope of finding one with a Trojan horse installed, which the hacker can then use to control the target computer.<sup class="reference">[ 1] </sup>A trojan differs from the <a href="wiki/Computer_virus" title="Computer virus">virus </a> in that only a file specifically designed to carry it can do so-- Edited by belgamo on Saturday 8th of May 2010 11:10:34 PM
Last edited by a moderator: