Font Size: a A A

Trojan Principle Analysis And System Implementation

Posted on:2012-11-26Degree:MasterType:Thesis
Country:ChinaCandidate:H MaoFull Text:PDF
GTID:2178330341950124Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
The 21st century is the information society, information as a resource, its universality, sharing, value-added, treatable and more, make its utility for human vital significance. The essence of information security is to protect the information systems or information network information resources from various types of threats, the interference and damage, namely assurance information security. Information security is any country, governments, departments, industry must attach to the question, is a nots allow to ignore to the national security strategy. However computer Trojan programs is the largest current network information security hidden danger.This paper present relatively popular Trojan technology's realization, working principle and remote control key technologies of the system the research, focus on the process of Trojan program realization, the controlled end and control analyzes the communications. In research Windows the workbench Trojan horse key technology foundation, given a Trojan effectively to the remote computer real-time monitoring system design and realization: Including Trojan client IOCP completion port based on the high-performance server model, the server using DLL Trojan remote thread embedded technology, this system can concealment to implant real-time controlled the computer, the computer screen display controlled current information, hard disk material information, browse files, etc. Various kinds of information transmission to remote control terminals; Finally, this paper gives some strategies to prevent Trojan.
Keywords/Search Tags:Information security, Trojan, Remote control, I/O Completion Port, Dynamicembedded
PDF Full Text Request
Related items