Saturday, June 1, 2019

Automated AntiTrojan 8211 A Necessity for Windows 9598 Users :: Essays Papers

Automated AntiTrojan 8211 A Necessity for Windows 9598 Users Software Security has been a top priority for all the run System programming companies. Although Windows 95/98 is the most widely used operating(a) system all over the world it is certainly not the outmatch when it derives to security. There are many flaws that declare been discovered and exploited by hackers. These hackers take advantage of the loopholes in the system to break through the security and work them access to a lot of confidential data in users computers across the Internet. Microsoft the producer of Windows 95/98 has not taken enough security measures when they programmed the operating system. One of the most dangerous programs that are used to exploit the security holes in the Windows 95/98 systems are Trojan Horses or Trojans. Well, they have postal code to do with horses, but technically, a trojan is a program which does something you dont expect it to do or a program which runs hidden and allows others to control your PC across the Internet/Network. Some people misunderstand a trojan to be a virus and they think that since they have a virus scanner protecting their computer, it will detect the trojan and remove it. But, most of the virus scanners are ineffective against many of the trojans because of their versatility. Most trojans come in two parts, the client and the server that the client consociates to. The server, when run, will often bury itself into a startup section of the users computer so that it is loaded every time he starts the computer. The servers are small programs which when run, open a port on the users computer which makes the PC hack-able and it waits for the hackers to connect to the computer. These programs servers are often invisible and they dont even show in the Ctrl + Alt +Delete menu. The bit that the hackers are interested in, is the client (see chassis 1 next page). This is the software product that is run by the hacker on his computer to connect to someone whos already running the server. The client software is used to issue commands to the server (the victims computer). Hacker Client Internet Server Victim If you take away any of the above components accordingly the trojan wont work. The HACKER needs a CLIENT to use to connect to the server.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.