Aliases
Trojan.Win32.Dialer.jw
TROJ_SMALL.APA
Dialer-496
Type Trojan
Dial/Eocha-A is a dialer application for accessing pornographic material.
When first run Dial/Eocha-A copies itself to the Desktop and User folders.
Dial/Eocha-A changes the Start Page and security settings for Microsoft Internet Explorer
http://www.sophos.com/virusinfo/analyses/dialeochaa.html
W32/Rbot-AJO
Aliases
WORM_RBOT.BVE
Backdoor.Win32.Rbot.vi
Type Spyware Worm
W32/Rbot-AJO is a Windows network worm which attempts to spread via network shares. The worm contains backdoor functions that allows unauthorized remote access to the infected computer via IRC channels while running in the background.
The worm spreads to network shares with weak passwords and also by using the following security exploits:
LSASS (MS04-011)
RPC-DCOM (MS04-012)
WKS (MS03-049) (CAN-2003-0812)
MSSQL (MS02-039) (CAN-2002-0649)
The following patches for the operating system vulnerabilities exploited by W32/Rbot-AJO can be obtained from the Microsoft website:
http://www.microsoft.com/technet/security/bulletin/MS04-011.mspx
http://www.microsoft.com/technet/security/bulletin/MS04-012.mspx
http://www.microsoft.com/technet/security/bulletin/MS03-049.mspx
http://www.microsoft.com/technet/security/bulletin/MS02-039.mspx
http://www.sophos.com/virusinfo/analyses/w32rbotajo.html

Chowhound
Comic Vine
GameFAQs
GameSpot
Giant Bomb
TechRepublic