You may need to translate that lot into Chinglish, Buffo old man.
You may need to translate that lot into Chinglish, Buffo old man.
Far to vague!a trojan
A pal of mine
a client's facility
purchased it off E-bay
version 1.6 or something.
the trojan horse software
some up-to-date anti-virus software
the virus checker
the infected files on the CD.
Somehow, this story has some kind of don't-use-illegal-software-because-it-contains-viruses-boogyman feel to it. We are here to inform each other, not to lauch another ghoststory.
What was the exact name of the threat/trojan etc, etc.
Don't get me wrong i hate piracy, but this claim just needs more details filled in.
oh, you've done it now...
agreed.. a Trojan does not eat processor cycles. It sits and waits for an event or trigger to activate it.. often times the payload is downloaded and installed without the user even knowing it. but the trojan itself is never that complex.
trojans work in a few ways
Remote Access (AKA Backdoor)
Data Destruction (AKA crosslinked files on hard drive)
Downloader/dropper (described above)
Server Trojan(Proxy, FTP , IRC, Email, HTTP/HTTPS, etc.) (used for mass spam mailing from your computer)
Disable security software (turn off virus protection)
Distributed Denial-of-service attack (not relevant here)
If the software IS infected it is most likely a downloader as that is the most current common way of infecting computer systems by way of trojan
Quis custodiet ipsos custodies?
Solid State Builders Group
Ok ok. I mean cracking.
I hired an Italian guy to do my wires. Now they look like spaghetti!