Briefly describe the main characteristics of the Trojan BO2K.

What will be an ideal response?


Possibly "gone legitimate" as an open source project, Back Orifice 2000 is an interesting combination of fair and foul and is appealing as a concept for a network administrator with at-risk remote users. Wouldn't it be great to be able to enforce antivirus definition updates on these remote computers, as a functional security policy,and get that functionality for free? There is a commercial product called LANDesk that does this, so some conclude that it must be alright. The BO2K software allows you to use infected machines like a string of proxy servers. It also lets you set notifiers on the infected machines so that any client that wants to can log into your infected box. That means more random strangers mucking through your network. What fun!

Computer Science & Information Technology

You might also like to view...

You can set your virus definitions to update automatically at certain intervals such as daily or weekly

Indicate whether the statement is true or false

Computer Science & Information Technology

In CentOS 7, if you need to create a mount point on the current file system you should first create a directory in the file system using the which command?

A. mkdir B. mkfs C. fdisk D. mount

Computer Science & Information Technology

________ is a physical capacity that requires no further intellectual effort

A) Speaking B) Talking C) Listening D) Hearing

Computer Science & Information Technology

Validation ________ are the rules that dictate the type of data that can be entered.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology