• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Trojan horse

Extracts from this document...

Introduction

Backdoor.Trojan hourse * This Trojan opens a port to allow a hacker to control the infected system. * Within the larger grouping, there are Trojans that share very similar characteristics. These are given specific names and include any Trojans with "Backdoor." at the beginning of the name, such as Backdoor.Subseven and Backdoor.Netbus. A Trojan can be sent as a file and can be combined with a game or a program. When you open the Trojan you cannot tell you have opened anything. ...read more.

Middle

But there is a easy way to avoid downloading viruses and that is to only take files from people you know and do not accept .exe files which are between 300kb and 400kb. The worm The worm is sent to you in email form and can say things like Hi ill reply to your email ASAP but until then you can view some pictures by downloading my zips and viewing my files. ...read more.

Conclusion

Open the Win.ini file in a text editor such as the System Configuration Editor (Sysedit.exe). 2. Remove the command C:\Windows\System\Explore.exe or C:\Windows\System\_Setup.exe from the run= line. 3. Restart the computer. 4. Delete Explore.exe from the C:\Windows\System folder. * If you are running Windows NT: 1. Start the Registry Editor (Regedit.exe). 2. Navigate to the following key: HKEY_CURRENT_USER\Software\Microsoft\WindowsNTCurrentVersion\Windows\Run and remove the entry that refers to "Explore.exe" or _setup.exe." 3. Restart the computer, or kill the process using Task Manager or Process View (if the file is currently in use.) 4. Delete Explore.exe from the C:\Winnt\System32 folder. Neal Mason IT Virus Research 11/10/02 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Smart Card System

    The proposed Computer Lab Management System has the better control in recording the student usage of the computer. The supervisor can also easy to view. Chapter 8: Testing 8.1 Overview of System Testing The principle of continuous integration applies as well to testing, which should also be a continuous activity during the development process.

  2. Flexible Architectures in Communication Security Application

    IDEA also turned in a poor performance, the primary bottleneck in this cipher is numerous 7-cycle multiplies. The AES standard candidates have much better performance with Rijndael leading the pack at 48.51 bytes/1000 cycles. The best performance overall was delivered by RC4 at 88.16 bytes/1000 cycles, more than 10 times the performance of 3DES.

  1. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    A language like Pascal will automatically generate machine code when it is compiled saving the programmer a lot of time and effort. A downside to Pascal though would be its graphical abilities and therefore high-level languages also include 4th generation programs which use similar high-level languages but also contain graphical functions to create GUI's with.

  2. Software Configuration

    Excel would be very useful. Using mathematical, as well as its advanced functions, we can achieve our desired objectives. In this program, data and formulas to calculate those data are entered into the spreadsheets/worksheets and from there we can analyze, validate and sort the data.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work