> Finally, reasonable configuration of a firewall (even a personal > firewall product installed on the workstation itself) will prevent > exploitation of a Back Orifice type trojan, even if one does manage > to sneak in unnoticed - these work by creating a listener which > allows those "in the know" to connect to the system using telnet, > ssh or a similar protocol, using a non-standard port number.
many of the newer remote control trojans connect out to a IRC (Internet Relay Chat) server (often using non-standard ports) and 'offer' themselves to the hackers rather than passively waiting for the hackers to connect to them. This will slip past a lot of firewalls. _________________________________________________________________________ Unsubscribe & list info -- http://www.ndatech.com/mersenne/signup.htm Mersenne Prime FAQ -- http://www.tasam.com/~lrwiman/FAQ-mers