Главная | Соглашение | Публикация статей

"Trojan horse"
Категория: English version

Method "Trojan horse" is a secret entry into someone else's program of commands that allow a new owner is not planned program functions, but at the same time preserve and earlier works. With the help of "Trojan horse" criminals, for example, pay at their own expense certain amount from each transaction.
Computer software texts are usually extremely complex. They consist of hundreds of thousands and sometimes millions of commands. The "Trojan horse" of the several dozen teams could hardly be found, unless, of course, there is no suspicion about this. But in the last - if it expert programmers take many days and weeks to find him.
An interesting case of "Trojan horse" one American programmer. He inserted into the computer company where he worked, the team did not otchislyayuschie money, and not to print outlet to report some income. These amounts, specially marked, "existed only in the system. Vulgar manner stolen letterhead, he filled them with an indication of its clandestine marking and received the money, and such transactions are still not printed and could not be subjected to audit.
There is another kind of "Trojan horse". Its peculiarity is that in bezobidno looking piece of the program is not inserted commands are actually doing "dirty" work. a team, forming this team and after the implementation of destroying them. In this case, the programmer, trying to find a "Trojan horse", must be sought not his own, and commands his form. Building on that idea, it is possible to imagine a team that created the team, etc. (arbitrarily large number of times), which pose a "Trojan horse".
In the U.S., spread a form of computer vandalism in which a "Trojan horse" breaks through a period of time, all the programs that are stored in the memory of the machine. Many arrived in the sale of computers was "temporary bomb, which" exploded "in the most unexpected moment, destroying the entire library of data.
Unfortunately, too many customers know that after the conflicts by the manufacturer of software that has so far worked well, suddenly started to behave very unpredictable ways and finally completely denied. Is not difficult to guess that copies on magnetic tapes or discs, providently made, the situation has not delivered.
There remained one way - go to confession to the developer.

"Trojan horse"

Статьи по теме:

Geographic Information Systems (GIS) as a means of collecting and analyzing Geodannyh
What file compression better?
More WinRAR 3.70 RU Final
Black Banner - History of discovery
Theft of computer data
Proxy Server - This effective way of protecting information as well as a barrier to attack, hackers
The organization and classification of printers
Run Windows
SWISH Max or Flash animation effects
The development of databases on Msde 2000, working with Free Database Mssql
Computer virus
Routers NetGear
Document for Linux
Fraud Cell Phones
Tips software and programs connected branch
All font - Using Type1 I Truetype
Hackers can control a PC without the knowledge of their owners
Fire systems company Satel now can be controlled by phone or Ethernet
Download Free Program is easy, but Nevygodno
Protection of information. Passwords At Rar archives
How to choose the CRM: Develop a short-list CRM systems
The destruction of computer data
The counterfeiting of computer information
Working in Windows Vista
Printing without a printing press? It is possible
Reduced-occupied Windows XP disk space
Classification LAN (LCS)
LIBCOM-2007: new items of high technology from the company «Alee Software»
Technical approaches to increase the security of the computer
Requirements for computer technology
Development and dissemination of computer viruses
COMPUTER CRIME PREVENTION
Zao «Light Kommunikeyshn» confirm its status «Microsot Gold Certified Partner» In 2008
With your husband talking about your computer?
Macromedia Dreamweaver against Microsoft placed on the first lane
The company Janet Systems Llc Presented Soa-Platform Ijanet Framework Ultra The exhibition «Kitel 2008»
Installing Windows Xp on a network without the use of Ris
Icons in the design. Stages and stage of development of computer
Classification of computers
How to Choose a Printer?
Linear Magnetic Recording Dlt (Dlt-V/Sdlt/Dlt-S4)
Safety Data
Local bus
Why work for a computer is harmful to human health
Aptitude CompactPCI-products of rapid obsolescence
Architecture Risc Computational kernels
New Decision on the market Soa
My Dear Oslik Or Setting Emule
Active Desktop Windows XP
Implementation Crm Systems Quick Sales 2 The Company «Epos»
Automation planning printing by Apple (Mac)
IBM sends framework ACTF donated Eclipse
Ms Word Vs Notepad
Development of Iron Industry Or Who Wanted Now Multi Processors
Crm, software