Upload
nessa
View
30
Download
0
Tags:
Embed Size (px)
DESCRIPTION
SOFTWARE. By: Francisco Rodriguez Karen Lopez Marcela Mireles Marcelo Sanchez Rodrigo Peña Erick Ontiveros. TROJANO / BACKDOOR. - PowerPoint PPT Presentation
Citation preview
SOFTWARE By:
Francisco RodriguezKaren Lopez
Marcela MirelesMarcelo Sanchez
Rodrigo PeñaErick Ontiveros
Backdoor Trojans , are said to be the new generation of cyber-vandalism, due to its illegal way to infiltrate to servers, personal computers or work stations, therefore being able to take control over these systems.
TROJANO / BACKDOOR
Backdoor trojans aren’t viruses essencially, they are mostly described as “Remote Control Tools”.
They not only hace self-codification, but also they use any Internet media to be transmitted: e-maill, chat, etc.
TROJANO / BACKDOOR
Even though everyday viruses are sent through infelcted files inside e-mails, many users alow this for several reasons including curiosity or for not having their operative systems or antiviruses updated, this makes this media the most used for the virus creators.
TROJANO / BACKDOOR
Firewall. Update software constantly.
(Antiviruses) Massive monitoring. Don’t put obvious passwords like
birthdates or nicknames. Be carefull with shared folders Be preventive.
How to prevent them:
NetBus Created by Carl-Fredrik Neikter in 1998, who said “NetBus was created for people to have fun with friends (…)”. Apparently people use it for more than just fun.
Back Orifice Was created on 1998 by the hackers known as the Cult of the Dead Cow..
SubSeven Was created in Germany by the hacker group S7G or Sub7Germany.
Three Famous Trojans / Backdoors
Extract and send informaton of the system to the hacker.
Download or send the computer’s files. Change passwords. Stop processes. Show messages on-screen. Manipulate mouse, restart the computer,
reset the hard drive, etc.
What can Trojans / Backdoors do ?
UPLOAD AND DOWNLOADBy: Francisco Rodriguez
Uploading and downloading refer to the two canonical directions (corresponding to send and receive, respectively) that information can move, and further defines such data as being copied and compiled (indicated by the term "loading") to create a complete file, after a period of time. Downloading is distinguished from the related concept of streaming, which indicates a download in which the data is sequentially usable as it downloads, or "streams," and that (typically) the data is not stored.
UPLOAD & DOWNLOAD
To download is to receive data to a local system from a remote system, such as a webserver, FTP server, email server, or other similar systems. A download is any file that is offered for downloading or that has been downloaded.
UPLOAD AND DOWNLOAD
The inverse operation, uploading, is the sending of data from a local system to a remote system, such as a server, or peer, with the intent that the remote system should save a copy of whatever is being transferred.
UPLOAD AND DOWNLOAD
Assistant By: Rodrigo Peña
Personal Assistant The assistant, or also called personal
digital assistant (PDA), is a small computer that can fit perfectly into a pocket, they may have image and sound capabilities, so they can also de used as mobile phones, web browsers, or portable media players.
Typical features
These devices usually have these features:
Touch screen Memory cards Wired and wireless
conectivity Synchronization
Automobile navigation: due to GPS (Global Positioning System)
Medical uses: because patients can record symptoms, more easily.
People with disabilities: because they are easy to operate
Uses
A program interface that takes advantage of the computer's graphics capabilities to make the program easier to use. Well-designed graphical user interfaces can free the user from learning complex command languages
Graphical User Interface
A symbol that appears on the display screen and that you move to select objects and commands. Usually, the pointer appears as a small angled arrow. Text -processing applications, however, use an I-beam pointer that is shaped like a capital I.
Pontier
A device, such as a mouse or trackball, that enables you to select objects on the display screen.
Ponting Device
Small pictures that represent commands, files, or windows. By moving the pointer to the icon and pressing a mouse button, you can execute a command or convert the icon into a window.
Icons
The area on the display screen where icons are grouped is often referred to as the desktop because the icons are intended to represent real objects on a real desktop.
Desktop
You can divide the screen into different areas. In each window, you can run a different program or display a different file. You can move windows around the display screen, and change their shape and size.
Windows