Sunday, October 13, 2019
Automated AntiTrojan 8211 A Necessity for Windows 9598 Users :: Essays Papers
Automated AntiTrojan 8211 A Necessity for Windows 9598 Users Software Security has been a top priority for all the Operating System programming companies. Although Windows 95/98 is the most widely used operating system all over the world it is certainly not the best when it comes to security. There are many flaws that have been discovered and exploited by ââ¬Ëhackersââ¬â¢. These hackers take advantage of the loopholes in the system to break through the security and give them access to a lot of confidential data in usersââ¬â¢ computers across the Internet. Microsoft the producer of Windows 95/98 has not taken enough security measures when they programmed the operating system. One of the most dangerous programs that are used to exploit the security holes in the Windows 95/98 systems are ââ¬ËTrojan Horsesââ¬â¢ or ââ¬ËTrojansââ¬â¢. Well, they have nothing to do with horses, but technically, a trojan is a program which does something you donââ¬â¢t expect it to do or a program which runââ¬â¢s hidden and allows others to control your PC across the Internet/Network. Some people misunderstand a trojan to be a virus and they think that since they have a virus scanner protecting their computer, it will detect the trojan and remove it. But, most of the virus scanners are ineffective against many of the trojans because of their versatility. Most trojans come in two parts, the client and the server that the client connects to. The server, when run, will often bury itself into a startup section of the userââ¬â¢s computer so that it is loaded every time he starts the computer. The servers are small programs which when run, open a port on the userââ¬â¢s computer which makes the PC ââ¬Ëhack-ableââ¬â¢ and it waits for the hackers to connect to the computer. These programs servers are often invisible and they donââ¬â¢t even show in the Ctrl + Alt +Delete menu. The bit that the hackers are interested in, is the client (see Fig 1 ââ¬â next page). This is the software that is run by the ha cker on his computer to connect to someone whoââ¬â¢s already running the server. The client software is used to issue commands to the server (the victimââ¬â¢s computer). Hacker ââ¬â Client ââ¬â Internet ââ¬â Server ââ¬â Victim If you take away any of the above components then the trojan wonââ¬â¢t work. The HACKER needs a CLIENT to use to connect to the server.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.