9.3 – Malware Setup, FUD and Avoidance (Part 1)

9.3 – Malware Setup, FUD and Avoidance (Part 1)
There are two types of Trojan attacks used by attackers to control their victims: local connection and remote connection. In local connection, an attacker performs Trojan attack only in a LAN (Local Area Network) and is able to control any system within that network. To do this, he needs to somehow install Trojan client software on victim machine. He can use either pen drive, CD or DVD to transfer Trojan client on victim machine. Now, he is able to control victim machine anywhere within the local network. In remote connection, an attacker is able to control a victim computer from…
To access this content, you must subscribe to this Consolidated Tekedia Subscription, or log in if you are a member.

Share this post