>
>If you want to write about _real_ trojan horses, you'll have to look
>elsewhere. Here's one definition of 'Trojan Horse', which bo2k does not
>meet: http://www.whatis.com/trojanho.htm
>
Exactly how does BO2K not meet the criteria in this link? Fits fine to me.
So you're saying that I can use the PCAnywhere client, scan the internet for
a random victim already infected with the server side of PCAnywhere, and
remotely
control the machine? I hadn't heard of this.
The "network administration tool" argument is a very weak argument.
Joel Gridley, CCNA, SOB "Be the packet."
Network Security/Firewall Specialist
GTE Internetworking, "Powered by BBN."
Burlington, MA
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]