Viruses and I have become intimately familiar over time; through mass infection, research, removal, and even writing a few of my own (purely for C++ practice, none of them released to the Internet or tested anywhere outside of my virus-testing computer). They're fascinating little bits of code. Backdoors and keyloggers (typically trojans, those viruses that do not self-replicate) are particularly insidious, the former either creating or exploiting weaknesses in a system to allow a user entry and, potentially, to control the system on a basic level. The latter requires less technical knowledge to design, but requires a great deal of finesse to work out. To steal any sort of data, in this case a log of keystrokes that will often reveal several passwords and private information, it has to be sent somewhere - potentially allowing someone who's carefully monitoring their connection or logging program activities to trace the data's path to the beneficiary, unless the creator is very, very careful. Thus, the 'safest' variety involves on-site pickup, but that requires you to have physical access to the machine in question. Anyway, more information about the various varieties of virus, hoax, and general malware can be found at: http://www.viruslist.com/ -------------------------- Ryan Bailey Azeral777@xxxxxxxxx "Men occasionally stumble over the truth, but most of them pick themselves up and hurry off is if nothing ever happened." - Sir Winston Churchill