Font Size: a A A

Research On Computer Remote-Control Techniques And Methods

Posted on:2004-06-22Degree:MasterType:Thesis
Country:ChinaCandidate:Y ChenFull Text:PDF
GTID:2168360122465466Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
Trojan horse is a kind of tool programs, which has the characteristics of concealment and unauthorization, based on the computer remote-control technique.According to the techniques the Trojan Horses can be called as neither good nor evil. For the purpose of national security, it is necessary to control specific computers remotely and secretly in specific duration and/or at specific sites. The techniques are the same as used by Trojan horses. In this thesis, based on the materials on Trojan horses collected from all over the world, the principles and implementation styles of recent popular Trojan horse techniques are comprehensively analyzed, especially focused on the concealing, communicating between foreground and background, and auto-downloading. Then a Trojan horse utility program is designed and implemented for the business of the NSA (National Security Affairs). It is a smaller program with some powerful functionality. It can pass through the Trojan horse tool check, bypass the blocking by firewalls and routers, and be rebooted and removed. It is really concealable and secret, and the controller subprogram is reliable and robust.
Keywords/Search Tags:Computer security, Remote-control, Trojan horse, Windows programming, Network security
PDF Full Text Request
Related items