เนื้อหาประกอบไปด้วย
[Introduction]
[What Is A Trojan?]
[Anti-Virus Solutions]
- Introduction
- How Do AV’s Detect Trojans?
- What Is Heuristic Analysis?
- What Is A File Packer/Compressor?
- Norton Anti-Virus (Symantec)
- McAfee Anti-Virus (Network Associates)
- Kaspersky Anti-Virus (Kaspersky Labs)
- NOD32 (ESET)
- Bit Defender
- Panda Anti-Virus (Panda Software)
[Trojans]
- Back Orifice XP
- Bifrost
- CIA
- Lithium
- MoSucker
- Net Devil
- Nuclear RAT
- Optix Pro
- Poison Ivy
- SubSeven
- Tequila Bandita
- Theef
[The Scene]
- The Trojan Coder
- The Script Kiddie
[Trojan Removal]
- Detecting A Trojan
- General Removal
[Methods Of Infection]
- IRC
- P2P
- Instant Messaging
- Web Pages
- Software Vulnerabilities
- Social Engineering
Igniteds Security Group - Igniteds.NET______________________
[Trojan Technologies]
- Rootkit Technology
- Polymorphism
- Firewall Bypass
- Reverse Connection
[Security Tools]
- Zone Alarm
- Agnitum Outpost Firewall
- PsList
- PsKill
- Registry Commander
- X-Netstat
[About The Author]
**Hidden Content: To see this hidden content your post count must be 1 or greater.**


Reply With Quote
