>
>If you want to write about _real_ trojan horses, you'll have to look
>elsewhere.  Here's one definition of 'Trojan Horse', which bo2k does not
>meet: http://www.whatis.com/trojanho.htm
>

Exactly how does BO2K not meet the criteria in this link? Fits fine to me.

So you're saying that I can use the PCAnywhere client, scan the internet for 
a random victim already infected with the server side of PCAnywhere, and
remotely 
control the machine? I hadn't heard of this. 

The "network administration tool" argument is a very weak argument. 





Joel Gridley, CCNA, SOB                    "Be the packet."
Network Security/Firewall Specialist
GTE Internetworking, "Powered by BBN."
Burlington, MA
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to