Font Size: a A A

Remote Control And Computer Technology Hidden Trojan-based Research

Posted on:2013-09-19Degree:MasterType:Thesis
Country:ChinaCandidate:L J XuFull Text:PDF
GTID:2268330395473948Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of computer and Internet technology, the Internet has an enormous impact on people’s lifestyles and ways of working. Recent surveys show the number of Internet users in China has exceeded500million, thus more and more people began to access and use of the Internet. The rapid development of Hacking technique has been threatening Internet security.Sichuan Province Information Security Evaluation Center is charged with the responsibility of the assessment and protection of Sichuan Province and the province information systems security. In practical work a remote computer control system on implementation of the security check is required. To design and implement computer remote control system meeting the needs of the practical work, to take advantage of the system implementation of remote controlled computer security check, to better protect the security of important information system of Sichuan Province is the starting point for research in this article.This thesis analyzes the Trojan technology generation, development and the classification today, and focuses on the Trojan’s hidden technology and remote control technology. Combined with the special needs of the actual work, given based on the Windows platform Trojan mainstream hidden technology implemented on the remote computer, this thesis endeavor s to realize the effective implementation of the computer remote control system to monitor the design and implementation. The system can pass through the firewall, covertly implanted controlled computer, remote controlled computer in real-time remote control and in accordance with the instructions of the control side.
Keywords/Search Tags:Trojan house technology, Remote control, Process concealing
PDF Full Text Request
Related items