Skip to main content

RATS

What? Rats? Those pesky black things that always cause damage in the house. Very cute to look still very destructive all the same. This is supposed to be a site on Internet Security not household and pest management. So why all this here?
Put your thoughts aside for a while and let me continue. I am not talking about the above rats. This is in continuation on what the uninitiated call as Trojans which I had hinted upon in my earlier article and what the refined call as Remote Administrative Tools or RATS. Trojans can be very destructive if you're not careful. So tighten your seat belts as we gear up for take-off.
To define Trojans, we refresh our knowledge of a virus. A virus is a self-replicating piece of code designed to cause damage or irritation. Trojans assume much greater risk proportions. As the name RATS suggest, they allow a remote user to operate your PC sitting thousands of miles away via the Internet. Surprised? No need to be. The Internet today imparts such power that even a lame user can do this to you.
Note: Lame means a user possessing limited knowledge. In other words, a naive user, not a professional.
Evolution
Every thing has a beginning. This is the most basic principle of evolution. Trojans evolved from what can be termed as an exploitation of a basic administrative need. When Internet began to spread its wings in late 90s, corporations found the regional barriers too small for comfort. They wanted to expand their horizons. For this, they needed a software which could help in remote management of resources. Wherein a person can manage all the company resources spread across the world. Microsoft, as it always does, recognized this need and came up with a software package Microsoft Back Office.
The Underground was quick to pounce upon this thought. It is a fundamental rule in computing (or for anything) that Nothing is perfect. There are always some loopholes left open for exploitation. The Underground came up with what can be branded as the first Trojan known as Back Orifice (a lash at Microsoft). This had limited remote administrative powers still it pioneered the Underground in this direction. Today Back Orifice remains as one of the all-time powerful Trojan. It is managed by Cult Of Dead Cow (www.cultofdeadcow.com). Many soon followed suite and the next popular one was Netbus.
Today, Trojans impart a lot of power and are extremely easy to use. In the next article, we will try to classify Trojans based on their remote administrating prowess. Till then adieu.
Trojans-The Beginning Read on to know more about the supreme tool of novice and advanced hacking. The tool that got through Microsoft's defense. One that can create havoc on your PC also. This is just the beginning.

Comments

Popular posts from this blog

Something More About Nexus One

In A Previous Post, I Have Mentioned About " Nexus One " Mobile Phones. But You May Not Got A Detailed Review On It. Therefore I'm Going To Show You A 10 Min Review On Nexus One, So Enjoy The Video. alsoread: Cool Applications For Your Android Device

How To: Get A Free .EDU Email Address [Updated]

Edu domain extensions are restricted to Educational institutions, And most of the .edu domains are registered by US-based educational institutions. Students or staff of some specific institutions are getting their own personal email addresses with the .edu extension. A significant portion of students does not have this type of email address, especially those outside the US. These .edu email addresses will help you to get lots of discounts on software and services. In this article, I'll guide you to get a free .EDU email address .

How To: Open Facebook Chat In A New Window

Facebook chat may turn annoying when you are busily keep navigating on Fb. Sometimes you may loose messages while navigating, You could fix this problem by using Fb chat in a separate new window.