Is there software you can download to test if you have these trojans?
Code to detect the two common trojans is built into Snow Leopard

Is there software you can download to test if you have these trojans?
The kudos angle does seem very odd.
I'm sure most people writing malware are most concerned with maximum profit and marketshare, leading them to Windows, but every single one of them?
Why doesn't anyone of you come up with the simplest of answers to the question?
Windows is exploited because when installing and uninstalling programs it uses a closed operating system. So no registry entries are made and no libraries are installed to the sysytem root to take advantage. On a Windows PC you have to uninstall programs which leaves fragments in the registry and in the root library. On a mac nothing enters the system so if you don't want the app anymore, you just delete it. A lot simple than taking up time wasting resoures that are just not needed.
All this time you system remains untouched because it in someways operates more like a closed Rom. This is why it is easy on system rebuilds. you just backup your data.
Windows 7 has just encorporated something similar in their "boot.Part", but most ignore this protection and re-encorporate it into their main partition leaving them open to viruses once again.
Just one example would be OSX still doesn't have a firewall enabled by default. Guess which OS learned that lesson the hard way? XP Service Pack 1.
That's the side effect of a NAT router vs the world. Of course you must also personally know and and trust all computers on the LAN, which might be true on a home network but probably not anywhere else.In all my years I've never had a software firewall enabled (on Windows or more recently OS X). That's what my router is for.
I am not championing the security of OSX. In fact it is very easy to get into. The problem is that there is very little to be done when you get in. Not only that, unlike windows it doesn't rely on permissions when you get into the OS.
Windows worst enemy is Vitual memory which is the biggest propergater of viruses I have ever known. Load up IE and the first thing that happens is the webpage is copied to vitual memory. Any Pop-ups etc on that can be Bots. Even when you close the page that bot is still on your HD and in VM. All the Bot has to do is copy itself to any open source on the system and there goes your security. Firewall-what firewall.