Skip to main content

Trojan blackdoor

What is trojan backdoor ?
Backdoor.Trojan is a detection name used
by Symantec to identify malicious software
programs that share the primary
functionality of enabling a remote attacker
to have access to or send commands to a
compromised computer.
As the name suggests, these threats are
used to provide a covert channel through
which a remote attacker can access and
control a computer. The Trojans vary in
sophistication, ranging from those that
only allow for limited functions to be
performed
to those that allow almost any action to be
carried out, thus allowing the remote
attacker to almost completely take over
control of a computer.
A computer with a sophisticated back door
program installed may also be referred to
as a "zombie" or a "bot". A network of
such bots may often be referred to as a
"botnet". Botnets have been well publicized
in the news over the years, with different
instances being given specific names such
as Kraken, Mariposa, or Kneber, along with
claims of hundreds of thousands of nodes
belonging to certain networks.

Comments

Popular posts from this blog

Physical Teleportation Theoretical method to do It!

Teleportation is the ability of moving matter from one point in time and space to another point in time and space instantaneously. There are different types of teleportation available at this time both visual and physical teleportation are possible and we use visual teleportation as our starting point. Types Visual body teleportation Astral body teleportation The different types of visual teleportation are. visual body or astral body teleportation , or visual object teleportation but before we can master teleportation we must first learn the art of Telekinesis/Psychokinesis and Clairsentience and the higher state of consciousness the seventh sense. Other abilities useful in teleportation are Tele-Visualization and ESP (Extrasensory Perception). The ability of teleportation is used in Time travel, Interstellar travel, and Dimensional travel. Teleportation is the near instantaneous transport of the Psychic from one location to another and there is no other fo...

Man in the middle attack

Man-in-the-Middle Attack ————————————— Man-In-The-Middle attack is the type of attack where attackers intrude into an existing connection to intercept the exchanged data and inject false information. It involves eavesdropping on a connection, intruding into a connection, intercepting messages, and selectively modifying data. DEFINITION : —————— The term "Man-in-the-middle attack" (MITM attack) refers to the type of attack where the attacker intrudes into the communication between the endpoints on a network to inject false information and intercept the data transferred between them. MITM attack is also known as: ————————————— Bucket-brigade attack —————————— Fire brigade attack —————————...