Direct connection in RAT?
It is possible to remotely install a piece of software on a computer with the intention of
taking control of that computer without the legitimate operator becoming aware of it.
This connection type can normally only be made if the remote computer operator has the
I.P address of the computer required to be controlled. Most " firewall" software usually "blocks" this type of invasive software. However, experienced computer software
programmers have developed sophisticated programs to "bypass" typical firewall
software. There is a continual process to produce counter measures against such intrusive software programs.
It is possible to remotely install a piece of software on a computer with the intention of
taking control of that computer without the legitimate operator becoming aware of it.
This connection type can normally only be made if the remote computer operator has the
I.P address of the computer required to be controlled. Most " firewall" software usually "blocks" this type of invasive software. However, experienced computer software
programmers have developed sophisticated programs to "bypass" typical firewall
software. There is a continual process to produce counter measures against such intrusive software programs.
No comments:
Post a Comment