> From: > > http://en.wikipedia.org/wiki/Trojan_horse_%28computing%29 > > In practice, Trojan Horses in the wild do contain spying functions (such > as a Packet sniffer) or backdoor functions that allow a computer, > unbeknownst to the owner, to be remotely controlled remotely from the > network, creating a "zombie_computer". Because Trojan horses often have > these harmful functions, there often arises the misunderstanding that > such functions define a Trojan Horse.
Jason, you just posted a quote that contradicts your stance. You are now officially fighting yourself. This quote says exactly what Thierry has been telling you: "In practice, Trojan Horses in the wild do contain [[the stuff Jason said they do]]. Because Trojan horses often [[do the things Jason said they do]], there often arises the misunderstanding that [[Jason's definition]] define[s] a Trojan Horse." This last sentence is saying that people often think that since a trojan is often a backdoor that all trojans are backdoors, when in fact the definition of a trojan is much broader. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
