21
SOFTWARE By: Francisco Rodriguez Karen Lopez Marcela Mireles Marcelo Sanchez Rodrigo Peña Erick Ontiveros

SOFTWARE

  • Upload
    nessa

  • View
    30

  • Download
    0

Embed Size (px)

DESCRIPTION

SOFTWARE. By: Francisco Rodriguez Karen Lopez Marcela Mireles Marcelo Sanchez Rodrigo Peña Erick Ontiveros. TROJANO / BACKDOOR. - PowerPoint PPT Presentation

Citation preview

Page 1: SOFTWARE

SOFTWARE By:

Francisco RodriguezKaren Lopez

Marcela MirelesMarcelo Sanchez

Rodrigo PeñaErick Ontiveros

Page 2: SOFTWARE

Backdoor Trojans , are said to be the new generation of cyber-vandalism, due to its illegal way to infiltrate to servers, personal computers or work stations, therefore being able to take control over these systems.

TROJANO / BACKDOOR

Page 3: SOFTWARE

Backdoor trojans aren’t viruses essencially, they are mostly described as “Remote Control Tools”.

They not only hace self-codification, but also they use any Internet media to be transmitted: e-maill, chat, etc.

TROJANO / BACKDOOR

Page 4: SOFTWARE

Even though everyday viruses are sent through infelcted files inside e-mails, many users alow this for several reasons including curiosity or for not having their operative systems or antiviruses updated, this makes this media the most used for the virus creators.

TROJANO / BACKDOOR

Page 5: SOFTWARE

Firewall. Update software constantly.

(Antiviruses) Massive monitoring. Don’t put obvious passwords like

birthdates or nicknames. Be carefull with shared folders Be preventive.

How to prevent them:

Page 6: SOFTWARE

NetBus  Created by Carl-Fredrik Neikter in 1998, who said “NetBus was created for people to have fun with friends (…)”. Apparently people use it for more than just fun.

Back Orifice Was created on 1998 by the hackers known as the Cult of the Dead Cow..

SubSeven Was created in Germany by the hacker group S7G or Sub7Germany.

Three Famous Trojans / Backdoors

Page 7: SOFTWARE

Extract and send informaton of the system to the hacker.

Download or send the computer’s files. Change passwords. Stop processes. Show messages on-screen. Manipulate mouse, restart the computer,

reset the hard drive, etc.

What can Trojans / Backdoors do ?

Page 8: SOFTWARE

UPLOAD AND DOWNLOADBy: Francisco Rodriguez

Page 9: SOFTWARE

Uploading and downloading refer to the two canonical directions (corresponding to send and receive, respectively) that information can move, and further defines such data as being copied and compiled (indicated by the term "loading") to create a complete file, after a period of time. Downloading is distinguished from the related concept of streaming, which indicates a download in which the data is sequentially usable as it downloads, or "streams," and that (typically) the data is not stored.

UPLOAD & DOWNLOAD

Page 10: SOFTWARE

To download is to receive data to a local system from a remote system, such as a webserver, FTP server, email server, or other similar systems. A download is any file that is offered for downloading or that has been downloaded.

UPLOAD AND DOWNLOAD

Page 11: SOFTWARE

The inverse operation, uploading, is the sending of data from a local system to a remote system, such as a server, or peer, with the intent that the remote system should save a copy of whatever is being transferred.

UPLOAD AND DOWNLOAD

Page 12: SOFTWARE

Assistant By: Rodrigo Peña

Page 13: SOFTWARE

Personal Assistant The assistant, or also called personal

digital assistant (PDA), is a small computer that can fit perfectly into a pocket, they may have image and sound capabilities, so they can also de used as mobile phones, web browsers, or portable media players.

Page 14: SOFTWARE

Typical features

These devices usually have these features:

Touch screen Memory cards Wired and wireless

conectivity Synchronization

Page 15: SOFTWARE

Automobile navigation: due to GPS (Global Positioning System)

Medical uses: because patients can record symptoms, more easily.

People with disabilities: because they are easy to operate

Uses

Page 16: SOFTWARE

A program interface that takes advantage of the computer's graphics capabilities to make the program easier to use. Well-designed graphical user interfaces can free the user from learning complex command languages

Graphical User Interface

Page 17: SOFTWARE

A symbol that appears on the display screen and that you move to select objects and commands. Usually, the pointer appears as a small angled arrow. Text -processing applications, however, use an I-beam pointer that is shaped like a capital I.

Pontier

Page 18: SOFTWARE

A device, such as a mouse or trackball, that enables you to select objects on the display screen.

Ponting Device

Page 19: SOFTWARE

Small pictures that represent commands, files, or windows. By moving the pointer to the icon and pressing a mouse button, you can execute a command or convert the icon into a window.

Icons

Page 20: SOFTWARE

The area on the display screen where icons are grouped is often referred to as the desktop because the icons are intended to represent real objects on a real desktop.

Desktop

Page 21: SOFTWARE

You can divide the screen into different areas. In each window, you can run a different program or display a different file. You can move windows around the display screen, and change their shape and size.

Windows