> Finally, reasonable configuration of a firewall (even a personal
> firewall product installed on the workstation itself) will prevent
> exploitation of a Back Orifice type trojan, even if one does manage
> to sneak in unnoticed - these work by creating a listener which
> allows those "in the know" to connect to the system using telnet,
> ssh or a similar protocol, using a non-standard port number.

many of the newer remote control trojans connect out to a IRC (Internet
Relay Chat) server (often using non-standard ports) and 'offer' themselves
to the hackers rather than passively waiting for the hackers to connect to
them.  This will slip past a lot of firewalls.



_________________________________________________________________________
Unsubscribe & list info -- http://www.ndatech.com/mersenne/signup.htm
Mersenne Prime FAQ      -- http://www.tasam.com/~lrwiman/FAQ-mers

Reply via email to