Home | About Us | Contact Us | Threats to your Security on the Internet | Products | Services | Support | Survey | Online Store |
||||||||||||
RCT's & RAT's What are they? How do I detect them? How many are there? What ports do they use? How do I Remove? Acid Shivers Acid Shivers (modified) Back Orifice Baron Knight Big Gluck Blade Runner Bugs Deep Back Orifice Delta Source Devil Doly Trojan Deep Throat Deep Throat v2 Executer v1 Executer v2 Girlfriend Hack 'a' Tack Master's Paradise NetBus NetBus 2 Pro NetSphere Sockets 'de Troie SubSeven (Sub7) Whack-a-mole (NetBus) WinCrash Additional Resources Latest News Mailing List Recommended Books Recommended Links Recommended Software |
The applications discussed within this website are known as 'Remote Control Trojans' (RCT's) or 'Remote Access Trojans' (RAT's), which are designed to allow the remote control of another person's computer over the Internet. "When a person uses a 'Remote Control Trojan', they are provided with equal, if not greater control of another person's PC than that of the owner sitting at its keyboard." - Don Kelloway
|
|||||||||||
©
Copyright Commodon Communications. All rights reserved. |