Font Size: a A A

Trojan Horse Principle Analysis And Project

Posted on:2010-07-03Degree:MasterType:Thesis
Country:ChinaCandidate:Z R XieFull Text:PDF
GTID:2178360278472231Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapidly growing of computer network technology, the reach of Internet has extended to every corner in the world, and it has an unprecedented influence on people's life styles and the work ways. The Internet gives the public convenience; meanwhile, it provides criminals chances to engage in criminal activities through using the network.Today, the intelligent crimes, by means of the computer network become frantic day by day, which caused more and more harms to the society, so the increase of network crimes proposed new challenges to network security in the information age. In a certain time and place, police should carry out remote control on suspect's target computer through which the criminals commit crimes via the internet and get rid of attacks. They should master the suspect's activities and crime evidence in order to crack down on crimes to protect the nation and people's security. All of these are the starting point of this essay.This essay takes research on realizing ways of popular Trojan horse technology, the principle of working and the remote—control system controlling technology. The important aspects lie in the explanation of Trojan's process realizing , the communication between controlling port and controlled port. This essay is under the platform of Window studies, on the basis of the Trojan essential technological foundation, produces one kind of system design and realization of an effective real-time monitoring on remote computers, which is unified the performance Trojan horse. This system can implant the controlled computer, will transmit the information, browsing documents that demonstrated on the controlled computer's current screen to the remote controlling end.
Keywords/Search Tags:Trojan horse principle, Trojan horse technology, Remote control
PDF Full Text Request
Related items