enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Ratfucking - Wikipedia

    en.wikipedia.org/wiki/Ratfucking

    Ratfucking is an American slang term for behind the scenes political sabotage or dirty tricks, particularly pertaining to elections.It was brought to public attention by Bob Woodward and Carl Bernstein in All the President's Men (1974), the book that chronicled their investigative reporting of the Watergate scandal.

  3. Beast (Trojan horse) - Wikipedia

    en.wikipedia.org/wiki/Beast_(trojan_horse)

    Beast is a Windows-based backdoor trojan horse, more commonly known in the hacking community as a Remote Administration Tool or a "RAT". It is capable of infecting versions of Windows from 95 to XP. [1] Written in Delphi and released first by its author Tataye in 2002, [2] it became quite popular due to its unique features.

  4. njRAT - Wikipedia

    en.wikipedia.org/wiki/NjRAT

    njRAT, also known as Bladabindi, [1] is a remote access tool (RAT) with user interface or trojan which allows the holder of the program to control the end-user's computer. It was first found in June 2013 with some variants traced to November 2012.

  5. Trojan horse (computing) - Wikipedia

    en.wikipedia.org/wiki/Trojan_horse_(computing)

    In computing, a Trojan horse (or simply Trojan) is a malware that misleads users of its true intent by disguising itself as a normal program. The term is derived from the ancient Greek story of the deceptive Trojan Horse that led to the fall of the city of Troy.

  6. DarkComet - Wikipedia

    en.wikipedia.org/wiki/DarkComet

    DarkComet, like many other RATs, uses a reverse-socket architecture. The uninfected computer with a GUI enabling control of infected ones is the client, while the infected systems (without a GUI) are servers. [7] When DarkComet executes, the server connects to the client and allows the client to control and monitor the server.

  7. Watering hole attack - Wikipedia

    en.wikipedia.org/wiki/Watering_hole_attack

    Watering hole is a computer attack strategy in which an attacker guesses or observes which websites an organization often uses and infects one or more of them with malware.

  8. Operation Shady RAT - Wikipedia

    en.wikipedia.org/wiki/Operation_Shady_RAT

    Operation Shady RAT is an ongoing series of cyber attacks starting in mid-2006 [1] reported by Dmitri Alperovitch, Vice President of Threat Research at Internet security company McAfee in August 2011, who also led and named the Night Dragon Operation and Operation Aurora cyberespionage intrusion investigations. [2]

  9. Sub7 - Wikipedia

    en.wikipedia.org/wiki/Sub7

    Sub7, or SubSeven or Sub7Server, is a Trojan horse - more specifically a Remote Trojan Horse - program originally released in February 1999. [1] [2] [3] Its name was derived by spelling NetBus backwards ("suBteN") and swapping "ten" with "seven".