It seems to me that you don't even understand how Trojan horses works from your description. Please check out the basic network security knowledge before trying to use advanced tools. It will just be a waste of time and worry yourself if you don't understand the reports generated by those tools, which are usually designed to be paranoid, and report many problems that are not problems in the specific environment of NUSNET.