I can't believe this... Andrew, please check the dictionary second definition of Trojan before proceeding.
A "remote access tool" is ssh, VNC and others and these are definitely not trojans. Get a grip. Trojan Horse noun noun Greek Mythology a hollow wooden statue of a horse in which the Greeks concealed themselves in order to enter Troy. • (also Trojan horse) figurative a person or thing intended secretly to undermine or bring about the downfall of an enemy or opponent : the rebels may use this peace accord as a Trojan horse to try and take over. • (also Trojan horse) Computing a program designed to breach the security of a computer system while ostensibly performing some innocuous function. Tom On Dec 6, 2011, at 6:49 PM, andrew.wallace wrote: > A trojan can be used for good if in the right hands as a remote access tool > for business use. > > > Andrew > > > ________________________________ > From: Bryan Fields <[email protected]> > To: "[email protected]" <[email protected]> > Sent: Tuesday, December 6, 2011 11:24 PM > Subject: Re: [[email protected]: C|Net Download.Com is now bundling Nmap > with malware!] > > On 12/6/2011 13:30, andrew.wallace wrote: >> It could be argued that Nmap is malware, and such software has already been >> called to be made illegal. >> >> If I was Cnet, I would stop distributing his software altogether. >> >> Link: http://nmap.org/book/legal-issues.html > > If this is not trolling and you actually believe this, just wow..... > > Nmap is just a tool, and any tool can be misused by people for criminal acts. > It's really no different than a gun in that regard. Both are incredibly > useful things in the right hands, mere tools to further security. However in > the wrong hands they can be used to commit crimes and break other peoples > security. > > -- > Bryan Fields > > 727-409-1194 - Voice > 727-214-2508 - Fax > http://bryanfields.net

