First of all I would like to say thanks for all the replies. 

        I agree it would be very unethical to use a Trojan to control a
network. And under no circumstances would I endanger any network with such
an idea even. As Security Professionals we have to be aware of all aspects
of Security. So with this in mind we have to take certain steps to testing
in an controlled environments. *security by obscurity* or even *security
through obscurity* is detrimental to all in the computer field. There are
certain steps that need to be followed to make security by obscurity from
software companies/writers non-existent. They maybe already in the works or
there is already a standard that's in place. 
This is just my opinion and the following statement earlier was a quick
question I wanted to see other Security Professionals view points on this
subject. Also if you  have any resources that you would like to share or
opinion's don't hesitate. But be considerate...
        Thanks
        

Hello Fellow Subscribers,

The Question I have is: What is your opinion on using a Trojan like
SubSeven to manage your network or even any other Remote Management type of
Program? And if you were how would you go about and testing the Prog for
Backdoors. And also could you suggest any remote management Software that
you have found useful and free is the key word here.



Levi M Pugh
PC TECH III
Fortune 800, Inc
5200 Golden Foothill Parkway
EL Dorado Hills, CA 95762
(916)605-0185
www.Fortune800.com


Reply via email to