Are you trying to ping a netbios name or a ip address? It would be possible for the sending comp to block IMCP traffic (ping) and able to use net send (tcp or ip?).
The sender could also be changing his netbios name to avoid being caught, but if you could log the traffic you'd be able to catch the person by recognizing the ip address.
-------------------------------------
from:
http://service1.symantec.com/SUPPORT/nav.nsf/docid/1999041209131106
What is a Trojan horse?
Trojan Horses are impostors--files that claim to be something desirable but, in fact, are malicious. A very important distinction between Trojan horse programs and true viruses is that they do not replicate themselves. Trojans contain malicious code that when triggered cause loss, or even theft, of data. For a Trojan horse to spread, you must, invite these programs onto your computers--for example, by opening an email attachment or downloading and running a file from the Internet. The PWSteal.Trojan is a Trojan.
------------------------------------
Common trojans include netbus, subseven, & BackOrifice
The named above install a host service on your machine that normally has to be started on boot, so check all startup locations (don't forget the registry!!! actually check it first). I believe most of these viruses communnicate on different ports so port blocking is out.
There are apps to scan for trojans, i believe moosoft is a popular one. Any virus scanner should pick these up as well.
I've never heard of anyone exploiting the Remote Assistance feature in XP. Also, to start one of these sessions, the user must send an invitation by win messenger or email.
------------------------
from:
http://www.webopedia.com/TERM/T/Trojan_horse.html
Trojan horse
A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.
The term comes from a story in Homer's Iliad, in which the Greeks give a giant wooden horse to their foes, the Trojans, ostensibly as a peace offering. But after the Trojans drag the horse inside their city walls, Greek soldiers sneak out of the horse's hollow belly and open the city gates, allowing their compatriots to pour in and capture Troy.
--------------------------------