Summary


Recap

  • Trojans are malicious pieces of code that carry cracker software to a target system

  • Trojans are used primarily to gain and retain access on the target system

  • Trojans often reside deep in the system and make registry changes that allow it to meet its purpose as a remote administration tool

  • Popular Trojans include back orifice, NetBus, SubSeven, beast etc.

  • Awareness and preventive measures are the best defense against Trojans.




Staf of EC-Council - Ethical Hacking Student Courseware. Certidied Ethical Hacker-Exam 312-50 (EC-Council E-Business Certification Series)
Staf of EC-Council - Ethical Hacking Student Courseware. Certidied Ethical Hacker-Exam 312-50 (EC-Council E-Business Certification Series)
ISBN: N/A
EAN: N/A
Year: 2003
Pages: 109

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net