AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
Back orifice trojan software12/8/2022 ![]() For corrections, suggestions, or missing papers, please either open an issue or submit a pull request. True to their word, anyone curious enough to log on to their website will find their computer automatically infected with a virus.This repository contains a curated list of papers, articles and other sources related to remote access trojans. The cult threatens to "dominate and subvert the media wherever possible. ![]() In its previous escapades, the cult claims to have changed the orbits of more than one communications satellite, and to have hacked into the CIA and the Pentagon. The software giant has sent warnings to customers telling them to avoid downloading e-mails from unknown sources, and encouraging them to keep their virus software up to date. Tony Perkins, editor of the Red Herring magazine in San Francisco said: "Even Microsoft is scrambling a little bit." ![]() This program they have created has absolutely no purpose except to damage users."īy Sunday morning several computer security firms had begun advertising detection software for the BO2K bug. "I certainly categorise what they're trying to do as being malicious. Jason Garms, from Windows NT security, denounced the launch of the bug. The launch of the BO2K bug is the latest skirmish in a long-running, intensifying online war between "black hats" (hackers) and "white hats" (computer security experts who design anti-virus programmes).Ī leading white hat, Jeffrey Carpenter, a member of the government-backed computer emergency response team at Carnegie Mellon university in Pittsburgh, said that BO2K "is one of several programs which, if installed on an organisation's computers, can give control of the computers to outsiders with malicious intent". "Our position is that Windows is a fundamentally broken product," he, or she, declared. The cult's minister of propaganda, whose online pseudonym is Death Veggie, claimed that the bug was designed to force Microsoft to improve its defences. ![]() However, several of the agents were publicly unmasked at the raucous convention during a "Spot the Fed" (FBI agent) competition. The FBI, Microsoft and computer security companies all reportedly sent agents to infiltrate the seventh annual DefCon convention in Las Vegas at the weekend, to try to discover the identity of the Cult of the Dead Cow members and acquire early versions of the BO2K in order to produce software antidotes and vaccines. ![]() The computer bug can be hidden in an e-mail and, once downloaded, operates as a Trojan horse inside the target's system, allowing it to be controlled by the hacker from a separate computer.Ĭomputer analysts say the system gives the hacker greater mastery of the target system than the authorised user's keyboard. ![]()
0 Comments
Read More
Leave a Reply. |