| 
  • If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • You already know Dokkio is an AI-powered assistant to organize & manage your digital files & messages. Very soon, Dokkio will support Outlook as well as One Drive. Check it out today!

View
 

Remote Access Trojan

Page history last edited by Audrey 17 years, 7 months ago

Text:

"Transmission" by Hari Kunzru: "In return for the home phone number of pro-golfer Tiger Woods (which badmAsh acquired as part of a batch in a previous trade, and which Elrick21 thinks ‘would be cool just to have’), he also acquires a lst of a dozen of so IP addresses belonging to computers onto which, unknown to their owners, Elrick21 has installed a piece of software known as a remote access trojan" (105).

 

Explanation:

A remote access trojan (RAT) runs invisibly on a computer and allows access to an unauthorized person’s remote control. RATs are made to mimic legitimate programs so that they will not draw the attention of the user or anti-virus programs. RAT originators can make the host computer do any number of things, such as reformat its hard drive or send the RAT to another computer. Remote access trojans are most commonly downloaded through internet games or email attachments.

 

Suggestions for further reading:

Comments (0)

You don't have permission to comment on this page.