RATS by Mayur Kamat SignUp
Boloji.com

Channels

In Focus

 
Analysis
Cartoons
Education
Environment
Opinion
Photo Essays
 
 

Columns

 
A Bystander's Diary
Business
Random Thoughts
 
 

Our Heritage

 
Architecture
Astrology
Ayurveda
Buddhism
Cinema
Culture
Festivals
Hinduism
History
People
Places
Sikhism
Spirituality
 
 

Society & Lifestyle

 
Health
Parenting
Perspective
Recipes
Society
Teens
Women
 
 

Creative Writings

 
Book Reviews
Computing
Ghalib's Corner
Humor
Individuality
Literary Shelf
Love Letters
Memoirs
Quotes
Stories
Travelogues
Workshop
 
 
Computing Share This Page
RATS
by Mayur Kamat Bookmark and Share

What? Rats? Those pesky black things that always cause damage in the house. Very cute to look still very destructive all the same. This is supposed to be a site on Internet Security not household and pest management. So why all this here?

Put your thoughts aside for a while and let me continue. I am not talking about the above rats. This is in continuation on what the uninitiated call as Trojans which I had hinted upon in my earlier article and what the refined call as Remote Administrative Tools or RATS. Trojans can be very destructive if you're not careful. So tighten your seat belts as we gear up for take-off.

To define Trojans, we refresh our knowledge of a virus. A virus is a self-replicating piece of code designed to cause damage or irritation. Trojans assume much greater risk proportions. As the name RATS suggest, they allow a remote user to operate your PC sitting thousands of miles away via the Internet. Surprised? No need to be. The Internet today imparts such power that even a lame user can do this to you.

Note: Lame means a user possessing limited knowledge. In other words, a naive user, not a professional.

Evolution

Every thing has a beginning. This is the most basic principle of evolution. Trojans evolved from what can be termed as an exploitation of a basic administrative need. When Internet began to spread its wings in late 90s, corporations found the regional barriers too small for comfort. They wanted to expand their horizons. For this, they needed a software which could help in remote management of resources. Wherein a person can manage all the company resources spread across the world. Microsoft, as it always does, recognized this need and came up with a software package Microsoft Back Office.

The Underground was quick to pounce upon this thought. It is a fundamental rule in computing (or for anything) that Nothing is perfect. There are always some loopholes left open for exploitation. The Underground  came up with what can be branded as the first Trojan known as Back Orifice (a lash at Microsoft). This had limited remote administrative powers still it pioneered the Underground  in this direction. Today Back Orifice remains as one of the all-time powerful Trojan. It is managed by Cult Of Dead Cow (www.cultofdeadcow.com). Many soon followed suite and the next popular one was Netbus

Today, Trojans impart a lot of power and are extremely easy to use. In the next article, we will try to classify Trojans based on their remote administrating prowess. Till then adieu.

Trojans-The Beginning Read on to know more about the supreme tool of novice and advanced hacking. The tool that got through Microsoft's defense. One that can create havoc on your PC also. This is just the beginning.      


Share This:
19-Mar-2000
More by :  Mayur Kamat
 
Views: 1772      Comments: 0




Name *
Email ID
 (will not be published)
Comment
Characters
Verification Code*
Can't read? Reload
Please fill the above code for verification.
 
Top | Computing



 
 
 
 
 
 
 
2018 All Rights Reserved
 
No part of this Internet site may be reproduced without prior written permission of the copyright holder
.