Skip to main content

RATS

What? Rats? Those pesky black things that always cause damage in the house. Very cute to look still very destructive all the same. This is supposed to be a site on Internet Security not household and pest management. So why all this here?
Put your thoughts aside for a while and let me continue. I am not talking about the above rats. This is in continuation on what the uninitiated call as Trojans which I had hinted upon in my earlier article and what the refined call as Remote Administrative Tools or RATS. Trojans can be very destructive if you're not careful. So tighten your seat belts as we gear up for take-off.
To define Trojans, we refresh our knowledge of a virus. A virus is a self-replicating piece of code designed to cause damage or irritation. Trojans assume much greater risk proportions. As the name RATS suggest, they allow a remote user to operate your PC sitting thousands of miles away via the Internet. Surprised? No need to be. The Internet today imparts such power that even a lame user can do this to you.
Note: Lame means a user possessing limited knowledge. In other words, a naive user, not a professional.
Evolution
Every thing has a beginning. This is the most basic principle of evolution. Trojans evolved from what can be termed as an exploitation of a basic administrative need. When Internet began to spread its wings in late 90s, corporations found the regional barriers too small for comfort. They wanted to expand their horizons. For this, they needed a software which could help in remote management of resources. Wherein a person can manage all the company resources spread across the world. Microsoft, as it always does, recognized this need and came up with a software package Microsoft Back Office.
The Underground was quick to pounce upon this thought. It is a fundamental rule in computing (or for anything) that Nothing is perfect. There are always some loopholes left open for exploitation. The Underground came up with what can be branded as the first Trojan known as Back Orifice (a lash at Microsoft). This had limited remote administrative powers still it pioneered the Underground in this direction. Today Back Orifice remains as one of the all-time powerful Trojan. It is managed by Cult Of Dead Cow (www.cultofdeadcow.com). Many soon followed suite and the next popular one was Netbus.
Today, Trojans impart a lot of power and are extremely easy to use. In the next article, we will try to classify Trojans based on their remote administrating prowess. Till then adieu.
Trojans-The Beginning Read on to know more about the supreme tool of novice and advanced hacking. The tool that got through Microsoft's defense. One that can create havoc on your PC also. This is just the beginning.

Comments

Popular posts from this blog

Auto Pager Extension For Firefox

AutoPager Extension Is A Powerful Tool For Firefox Browser. Autopager Automatically Loads The Next Page Of A Blog/Website Whenever You Reaches The End Of A Page. For Example:- By Default My 1001-Tricks Blog Shows Only The Latest 10-12 Posts On The Home Page. After Reading These Posts Then You Will Have To Click Older Posts To See The Next 12 Posts. But With The Help Of Autopager You Will Not Have To Click on Older Posts , ie, When You Reach The End Of The Page Autopager Will Make A Breakpoint And Shows The Next Page In Short. Autopager Works With A Ton Of Sites Including Blogger Blogs, Youtube , Google Search, Bing , Twitter , MSN , Live , Myspace , New York Times , Digg , Ebay , Amazon , Yahoo , Flickr , Wikipedia , & More... alsoread: Experience A Better Firefox

Get Certified In Ethical Hacking

Get A Cetificate On Ethical Hacking From Infosec Institute . To Know What Ethical Hacking Is Click Here [wikipedia] Read What Infosec Has To Say On Their Course: Our most popular information security and hacking training goes in-depth into the techniques used by malicious, black hat hackers with attention getting lectures and hands-on lab exercises . You leave with the ability to quantitatively assess and measure threats to information assets; and discover where your organization is most vulnerable to hacking in this course. To Know More Click Here... Sources: infosec , wikipedia alsoread: no more spam emails

Unlock Your Idea Netsetter For Free

You can use any sim cards with Idea Net Setter usb internet modem. For that, You need an Unlock Code. I'll help you to generate an unlock code for your device.