Font Size: a A A

Research On Computer Remote Control Technology

Posted on:2005-04-23Degree:MasterType:Thesis
Country:ChinaCandidate:C H DanFull Text:PDF
GTID:2178360182467325Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
While we look into current network security status, virus, worm, Trojan Horse and hacker have become the most important facts that challenge network security, and Trojan Horse has been widely adopted by all other facts. Nowadays, more and more new viruses and worms focus not only on breakage but on remote control of destination computer, and as you know, remote control is just the main function of Trojan Horse. Say nothing of hacker attack. From above we can see that almost all the facts use the technology of remote control and it is of importance for us to do some research work in this domain. And if we can strength network security by using our research result, it will be a terrific gift to network security. In order to have deep knowledge in network security defense, we must look into the detail aspects of remote control. It can be concluded that it is very urgent for we to do far more research work in remote control realm.In the first chapter of this paper, we mainly introduce the concept, developing trend, sort and function of Trojan Horse. In the second, we give much deep programming analyzing in the technology of remote control. In the third, we have a further analyzing in the developing technology of advanced Trojan Horse according to a self-made remote control software. In the fourth, we will discuss the technology of anti-Trojan-Horse. Here we design out a new kind of software of anti-Trojan-Horse by using enlightening search technology, and we have a detailed description for each module.
Keywords/Search Tags:Information Security, Network Security, Trojan Horse, Remote control, Anti-Trojan-Horse
PDF Full Text Request
Related items