Briefly describe the main characteristics of the Trojan BO2K.
What will be an ideal response?
Possibly "gone legitimate" as an open source project, Back Orifice 2000 is an interesting combination of fair and foul and is appealing as a concept for a network administrator with at-risk remote users. Wouldn't it be great to be able to enforce antivirus definition updates on these remote computers, as a functional security policy,and get that functionality for free? There is a commercial product called LANDesk that does this, so some conclude that it must be alright. The BO2K software allows you to use infected machines like a string of proxy servers. It also lets you set notifiers on the infected machines so that any client that wants to can log into your infected box. That means more random strangers mucking through your network. What fun!
You might also like to view...
How do you place an image into an active Photoshop document?
What will be an ideal response?
A technician is working inside a laser printer at a customer's site when a call comes in from another customer. What should the technician do first?
A) Take the call. B) Clean the hands with a warm cloth and then take the call. C) Ask permission to leave the room and take the call. D) Let the call go to voicemail.