Most trojans open a port or a number of ports on an infected machine to allow remote administration (control) by hackers.
We have put together a list of ports corresponding with the trojan or trojans that open these ports. This list is an image file and fairly large (about 1.5mbs) so if you are on a dial up connection please be aware that this file may take a while to view. (Broadband users will have no problems).
Click here to view the trojan port list