Startseite   |  Site map   |  A-Z artikel   |  Artikel einreichen   |   Kontakt   |  
  


informatik artikel (Interpretation und charakterisierung)

The all-stars: well known trojan horses


1. Java
2. Viren

The most famous Trojan Horses are definately Sub7, Netbus and BackOrifice2000. This Trojans are so easy to handle and to configure, that even amateurs are able to inflict damage by using them. This makes it very easy to become a victim for unstable characters, which get offended in an internet chatroom or forum and feel the need to strike back in the only possible way: the virtual way, which, unfortunately seems to be pretty functional.

The fact that the internet is overflown by websites offering Trojans for download or instructions on how to install them is very annoying since people using this service are a potential threat to everyone using the internet. This makes it more and more important these days to protect the own computer against attacks out of the net, which seem to increase with every day passing by.

Fortunately there are also websites dealing with the issue of how to protect a computer against Trojan Horse attacks. These websites provide needful hints like port-lists, term-definitions or ways of protection. See

. www.adnix.de,
. www.trojaner-info.de,

. www.anti-trojan.net,...

Trojan Horses or similar ways of virtual attacks will exist, as long there is the need to inflict virtual damage. This is a pity, as the Trojan originally was an ideal creation to control a computer via phone-line. This made a Trojan the perfect tool for long distance-maintenance of EDP-systems. That they have been misused ever since might be a good indicator for mankind's dark soul.

 
 

Datenschutz
Top Themen / Analyse
indicator Laser
indicator Programmablauf
indicator What is a trojan horse and what are it's capabilities?
indicator Kalibrierung -
indicator Aufbau und Struktur digitaler Rechenanlagen
indicator INTERNET:
indicator TCP/IP --
indicator The future of education
indicator MP3
indicator (Bartelme, Kahler-Ulepitsch)


Datenschutz
Zum selben thema
icon Netzwerk
icon Software
icon Entwicklung
icon Windows
icon Programm
icon Unix
icon Games
icon Sicherheit
icon Disk
icon Technologie
icon Bildung
icon Mp3
icon Cd
icon Suche
icon Grafik
icon Zahlung
icon Html
icon Internet
icon Hardware
icon Cpu
icon Firewall
icon Speicher
icon Mail
icon Banking
icon Video
icon Hacker
icon Design
icon Sprache
icon Dvd
icon Drucker
icon Elektronisches
icon Geschichte
icon Fehler
icon Website
icon Linux
icon Computer
A-Z informatik artikel:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z #

Copyright © 2008 - : ARTIKEL32 | Alle rechte vorbehalten.
Vervielfältigung im Ganzen oder teilweise das Material auf dieser Website gegen das Urheberrecht und wird bestraft, nach dem Gesetz.
dsolution