Font Size: a A A

Research And Realization Of Computer Remote Control Based On The Trojan

Posted on:2008-04-04Degree:MasterType:Thesis
Country:ChinaCandidate:C H SunFull Text:PDF
GTID:2178360218962130Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapidly growing of computer network technology, the reach of Internethas extended to every corner in the world, and it has an unprecedented influence onpeople's life styles and the work ways. The Internet gives the public convenience;meanwhile, it provides criminals chances to engage in criminal activities throughusing the network.Today, the intelligent crimes, by means of the computer network become franticday by day, which caused more and more harms to the society, so the increase ofnetwork crimes proposed new challenges to public Security in the information age. Ina certain time and place, police should carry out remote control on suspect's targetcomputer through which the criminals commit crimes via the internet and get rid ofattacks. They should master the suspect's activities and crime evidence in order tocrack down on crimes to protect the nation and people's security. All of these are thestarting point of this essay.This essay takes research on realizing ways of popular Trojan horse technology,the principle of working and the remote-control system controlling technology. Theimportant aspects lie in the explanation of Trojan's process concealing, thecommunication between controlling port and controlled port. This essay is under theplatform of Window studies, on the basis of the Trojan essential technologicalfoundation, and combined the special needs of actual security work, produces onekind of system design and realization of an effective real-time monitoring on remotecomputers, which is unified the high performance Trojan horse. This system canbypass many kinds of firewalls and routers, can escape many kinds of software thatcan look for and kill Trojan, also it can implant the controlled computer to start andwither away according to the orders of the controlling end. This system will transmitthe information, the keyboard records, browsing documents that demonstrated on thecontrolled computer's current screen to the remote controlling end.
Keywords/Search Tags:Trojan house technology, Remote control, Process concealing
PDF Full Text Request
Related items