Wednesday, October 2, 2019

Traiffic school :: essays research papers fc

Trojan Horses   Ã‚  Ã‚  Ã‚  Ã‚  A numerous amount of people depend on using remote access tools every day weather its to monitor other computers, Help people in large classes that cant get personal assistance, or even just for chatting with them. Every day a back door utility, otherwise known as the Trojan horse, infects hundreds if not even thousands of people over the Internet causing little annoyances to major destruction of a computer.   Ã‚  Ã‚  Ã‚  Ã‚  Trojans are very helpful utilities usually installed on computers networked on a server. With this installed the administrator can do a wide variety of commands on the other computer such as accessing files, looking at the screen, control the mouse, change the system bios and settings, log keys, and just about anything the other user can do.   Ã‚  Ã‚  Ã‚  Ã‚  Many of these utilities are free and can be found on the Internet but if you want one the more sophisticated and better quality you can purchase them. Big companies or places with several networked computers mostly purchase these products. Although this may seem like a really great idea there is also a dark malicious side to it.   Ã‚  Ã‚  Ã‚  Ã‚  These remote administrative utilities have mutated into Backdoor Trojan horses and have cause an enormous amount of damage. These programs are considered viruses my almost every anti virus there is. When a computer is infected the administrator can just about do anything he want to the infected computer. Many of these people call them self’s hackers when in fact an 8-year-old kid can learn how to use these types of programs in a matter of minutes or hours. How can a kid as young as 8 years old learn this kind of technology you might be wondering. Well its very simple and it goes like this.   Ã‚  Ã‚  Ã‚  Ã‚  First the â€Å"hacker† has to download the program off the Internet. Once that is accomplished there are a few things you have to do before you can use it. In most Trojan applications it comes with a file called a server witch is the file that actually infect your computer and an Edit server file with is used to set up the settings of the server. The first step is to change the name of the file to something else like †Mypic.jpg †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦exe† so the person downloading the file wont suspect anything if you tell them it’s a picture. The next step is to set up how the IP (Internet Protocol) address is going to be delivered to you once the file has been executed. Traiffic school :: essays research papers fc Trojan Horses   Ã‚  Ã‚  Ã‚  Ã‚  A numerous amount of people depend on using remote access tools every day weather its to monitor other computers, Help people in large classes that cant get personal assistance, or even just for chatting with them. Every day a back door utility, otherwise known as the Trojan horse, infects hundreds if not even thousands of people over the Internet causing little annoyances to major destruction of a computer.   Ã‚  Ã‚  Ã‚  Ã‚  Trojans are very helpful utilities usually installed on computers networked on a server. With this installed the administrator can do a wide variety of commands on the other computer such as accessing files, looking at the screen, control the mouse, change the system bios and settings, log keys, and just about anything the other user can do.   Ã‚  Ã‚  Ã‚  Ã‚  Many of these utilities are free and can be found on the Internet but if you want one the more sophisticated and better quality you can purchase them. Big companies or places with several networked computers mostly purchase these products. Although this may seem like a really great idea there is also a dark malicious side to it.   Ã‚  Ã‚  Ã‚  Ã‚  These remote administrative utilities have mutated into Backdoor Trojan horses and have cause an enormous amount of damage. These programs are considered viruses my almost every anti virus there is. When a computer is infected the administrator can just about do anything he want to the infected computer. Many of these people call them self’s hackers when in fact an 8-year-old kid can learn how to use these types of programs in a matter of minutes or hours. How can a kid as young as 8 years old learn this kind of technology you might be wondering. Well its very simple and it goes like this.   Ã‚  Ã‚  Ã‚  Ã‚  First the â€Å"hacker† has to download the program off the Internet. Once that is accomplished there are a few things you have to do before you can use it. In most Trojan applications it comes with a file called a server witch is the file that actually infect your computer and an Edit server file with is used to set up the settings of the server. The first step is to change the name of the file to something else like †Mypic.jpg †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦exe† so the person downloading the file wont suspect anything if you tell them it’s a picture. The next step is to set up how the IP (Internet Protocol) address is going to be delivered to you once the file has been executed.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.

Racial Issues and Music Essay Example For Students

Racial Issues and Music Essay During the time African American artists have had a significant impact in the music business. They have adv...