• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Trojan horse

Extracts from this document...

Introduction

Backdoor.Trojan hourse * This Trojan opens a port to allow a hacker to control the infected system. * Within the larger grouping, there are Trojans that share very similar characteristics. These are given specific names and include any Trojans with "Backdoor." at the beginning of the name, such as Backdoor.Subseven and Backdoor.Netbus. A Trojan can be sent as a file and can be combined with a game or a program. When you open the Trojan you cannot tell you have opened anything. ...read more.

Middle

But there is a easy way to avoid downloading viruses and that is to only take files from people you know and do not accept .exe files which are between 300kb and 400kb. The worm The worm is sent to you in email form and can say things like Hi ill reply to your email ASAP but until then you can view some pictures by downloading my zips and viewing my files. ...read more.

Conclusion

Open the Win.ini file in a text editor such as the System Configuration Editor (Sysedit.exe). 2. Remove the command C:\Windows\System\Explore.exe or C:\Windows\System\_Setup.exe from the run= line. 3. Restart the computer. 4. Delete Explore.exe from the C:\Windows\System folder. * If you are running Windows NT: 1. Start the Registry Editor (Regedit.exe). 2. Navigate to the following key: HKEY_CURRENT_USER\Software\Microsoft\WindowsNTCurrentVersion\Windows\Run and remove the entry that refers to "Explore.exe" or _setup.exe." 3. Restart the computer, or kill the process using Task Manager or Process View (if the file is currently in use.) 4. Delete Explore.exe from the C:\Winnt\System32 folder. Neal Mason IT Virus Research 11/10/02 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Smart Card System

    Java Card specifications enable JavaTM technology to run on smart cards and other devices with limited memory. With this two new technology, smart will be more efficient and it will be easily implemented into other applications as well. In the olden days, magnetic tape stripe card was used for storing data.

  2. Flexible Architectures in Communication Security Application

    Depending on the input stream, stores in the previous round of the algorithm could be dependent, however, the probability of this is 1/256 (assuming good diffusion). In the dynamically scheduled microarchitecture, these unknown (and mostly independent) stores stall later loads and reduce the overall throughput of the algorithm.

  1. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    Real-time processing can be further broken down into two subcategories. Interactive - This is where more than one user need to make queries and update information for processing. Process control - This involves the controlling of machinery through a computer system.

  2. Software Configuration

    In this package there is a wide range of colours, shapes and lines. This type of package is used to create cartoon animations, produce computer games, design logos and creates pictures. The drawing can be printed out or a collection of these can make a movie.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work