Artigo Revisado por pares

The Using Log of the Trojan horse Named SubSeven

2008; Elsevier BV; Linguagem: Inglês

ISSN

1872-6208

Autores

Chen Ning-jun,

Tópico(s)

Advanced Malware Detection Techniques

Resumo

firstly expatiate on the definition and harm of the Trojan horse, then, pay attention to the function and using method of the Trojan horse called SubSeven from the two aspects of server and control terminate, and note the process of using SubSenven, finally conclude and put forward the attack methods and the main preventive measure of the Trojan horse.

Referência(s)