• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Trojan horse

Extracts from this document...


Backdoor.Trojan hourse * This Trojan opens a port to allow a hacker to control the infected system. * Within the larger grouping, there are Trojans that share very similar characteristics. These are given specific names and include any Trojans with "Backdoor." at the beginning of the name, such as Backdoor.Subseven and Backdoor.Netbus. A Trojan can be sent as a file and can be combined with a game or a program. When you open the Trojan you cannot tell you have opened anything. ...read more.


But there is a easy way to avoid downloading viruses and that is to only take files from people you know and do not accept .exe files which are between 300kb and 400kb. The worm The worm is sent to you in email form and can say things like Hi ill reply to your email ASAP but until then you can view some pictures by downloading my zips and viewing my files. ...read more.


Open the Win.ini file in a text editor such as the System Configuration Editor (Sysedit.exe). 2. Remove the command C:\Windows\System\Explore.exe or C:\Windows\System\_Setup.exe from the run= line. 3. Restart the computer. 4. Delete Explore.exe from the C:\Windows\System folder. * If you are running Windows NT: 1. Start the Registry Editor (Regedit.exe). 2. Navigate to the following key: HKEY_CURRENT_USER\Software\Microsoft\WindowsNTCurrentVersion\Windows\Run and remove the entry that refers to "Explore.exe" or _setup.exe." 3. Restart the computer, or kill the process using Task Manager or Process View (if the file is currently in use.) 4. Delete Explore.exe from the C:\Winnt\System32 folder. Neal Mason IT Virus Research 11/10/02 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Smart Card System

    With lock-and-key, we can specify which users are permitted access to which source/destination hosts. These users must pass a user authentication process before they are permitted access to their designated host(s). Lock-and-key creates dynamic user access through a firewall, without compromising other configured security restrictions.

  2. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    logonfile END; CLOSEFILE(logonfile); // Terminate the use of the logonfile numberofrecs:=count; // Number of records in the array equals the amount counted END; procedure TFormLogon.BTlogonClick(Sender: TObject); var position : integer; userfound: boolean; begin position:=0; // Set position to 0 in array as only 1 record userfound:=false; // User has not

  1. Flexible Architectures in Communication Security Application

    XOR operations, which are modular additions in base 2, are easily reversible by XOR'ing the same value onto the resulting ciphertext. Substitutions Table-based substitutions can be used to quickly implement any keyparameterized function. An SBOX is a table of values indexed with plaintext (usually byte)

  2. Software Configuration

    In this package there is a wide range of colours, shapes and lines. This type of package is used to create cartoon animations, produce computer games, design logos and creates pictures. The drawing can be printed out or a collection of these can make a movie.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work