Hidden Backdoors, Trojan Horses and Rootkit Tools 
in a Windows Environment

   "... Often electronic intruders do not wish to create a spectacle but prefer 
to avoid fame by hiding their presence on compromised systems, sometimes 
leaving certain unexpected things.  They use sophisticated techniques to 
install specific "malware" (backdoors) to let them in again later with full 
control and in secret."

<http://www.windowsecurity.com/articles/Hidden_Backdoors_Trojan_Horses_and_Rootkit_Tools_in_a_Windows_Environment.html>


or >>  http://tinyurl.com/klw1


Printable Version >>

http://www.windowsecurity.com/pages/article_p.asp?id=1122





--- 

--
                ----------------------------------------
The WIN-HOME mailing list is powered by L-Soft's renowned
LISTSERV(R) list management software. For more information, go to:
http://www.lsoft.com/LISTSERV-powered.html

Reply via email to