Briefly describe the main characteristics of the Trojan BO2K.
What will be an ideal response?
Possibly "gone legitimate" as an open source project, Back Orifice 2000 is an interesting combination of fair and foul and is appealing as a concept for a network administrator with at-risk remote users. Wouldn't it be great to be able to enforce antivirus definition updates on these remote computers, as a functional security policy,and get that functionality for free? There is a commercial product called LANDesk that does this, so some conclude that it must be alright. The BO2K software allows you to use infected machines like a string of proxy servers. It also lets you set notifiers on the infected machines so that any client that wants to can log into your infected box. That means more random strangers mucking through your network. What fun!
You might also like to view...
You can set your virus definitions to update automatically at certain intervals such as daily or weekly
Indicate whether the statement is true or false
In CentOS 7, if you need to create a mount point on the current file system you should first create a directory in the file system using the which command?
A. mkdir B. mkfs C. fdisk D. mount
________ is a physical capacity that requires no further intellectual effort
A) Speaking B) Talking C) Listening D) Hearing
Validation ________ are the rules that dictate the type of data that can be entered.
Fill in the blank(s) with the appropriate word(s).