Sort of in conjunction with the recent hacking threads, I just got hit with either a remote or a sub 7 or some type of trojan. You know the type that the victim has to have running?
Something that a "hacker" probably spet weeks setting up I removed in less than 10 minutes.