The Using Log of the Trojan horse Named SubSeven
2008; Elsevier BV; Linguagem: Inglês
ISSN
1872-6208
Autores Tópico(s)Advanced Malware Detection Techniques
Resumofirstly expatiate on the definition and harm of the Trojan horse, then, pay attention to the function and using method of the Trojan horse called SubSeven from the two aspects of server and control terminate, and note the process of using SubSenven, finally conclude and put forward the attack methods and the main preventive measure of the Trojan horse.
Referência(s)