02.11.2014 Views

untangling_the_web

untangling_the_web

untangling_the_web

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

DID: 4046925<br />

UNCLASSIFIEONFOR OFFIGIAL l:JSE ONLY<br />

Bugnosis does not block or clear <strong>web</strong> bugs, but it will certainly make you want to<br />

fumigate your computer by letting you see just how many of <strong>the</strong>se pests are infesting<br />

<strong>the</strong> <strong>web</strong>sites you visit, but it only works with Internet Explorer. For a detailed<br />

explanation of how <strong>web</strong> bugs work and how <strong>the</strong>y are used, see <strong>the</strong> Web Bug FAQ<br />

provided by <strong>the</strong> Privacy Foundation.<br />

Bugnosis<br />

Web Bug FAQ<br />

Guidescope<br />

http://www.bugnosis.org/<br />

http://www.bugnosis.org/faq.html<br />

http://www.guidescope.com/home/<br />

WebWashe~o7<br />

http://www.cyberguard.com/products/<strong>web</strong>washer/<strong>web</strong>washerproducts/c1assiclindex.html<br />

Find and Remove Trojan Horses 208<br />

There are few things worse that can happen to your computer than to become<br />

infested with a Trojan horse in general or a RAT in particular. A RAT is a special<br />

form of a Trojan: <strong>the</strong> Remote Access Trojan, which is malicious software that runs<br />

invisibly on a computer and permits an intruder to access and control that computer<br />

remotely. The reason Trojans and RATs are so pernicious, dangerous, and<br />

infuriating is that <strong>the</strong>y are difficult to detect and harder still to exterminate. The<br />

best defense, not surprisingly, is a good offense: don't get a Trojan in <strong>the</strong> first place.<br />

So how do most people get Trojans on <strong>the</strong>ir computers? There are many ways, but<br />

<strong>the</strong> most common are unwittingly installing <strong>the</strong>m in games or o<strong>the</strong>r software, or by<br />

opening email attachments.<br />

As if this isn't bad enough, in September 2005, F-Secure identified a new Trojan<br />

horse that moves from mobile phones to computers. It appears to be a pirated<br />

version of a mobile phone game users can download from <strong>the</strong> <strong>web</strong>; <strong>the</strong> malware<br />

installs itself and runs on a PC when a user transfers data from his mobile phone to<br />

his computer. The Trojan also infects <strong>the</strong> phone. While this vulnerability is rated as a<br />

206 "Web bug," Computer Desktop Encyclopedia. Computer Language Company Inc., 2005,<br />

Answers.com, (14 November 2006).<br />

207 "Cyberguard has changed <strong>the</strong> license for Webwasher Classic to Donationware and asks you to<br />

make a donation before downloading Webwasher Classic." However, <strong>the</strong> donation is voluntary.<br />

208 A Trojan horse is "a program in which malicious or harmful code is contained inside apparently<br />

harmless programming or data in such a way that it can get control and do its chosen form of<br />

damage." Trojan horses are often used in what are known as "zombie" distributed denial of service<br />

attacks in which attackers place Trojans on many computers, <strong>the</strong>n use <strong>the</strong>m as part of a concerted<br />

attack, flooding a <strong>web</strong>site or server with so much data it is effectively shut down. Many people have<br />

Trojan horses on <strong>the</strong>ir computers without knowing it. "Trojan horse," SearchSecurity.com,<br />

(14 November 2006).<br />

588 UNCLASSIFIEOHFOR OFFIOIAL l:JSE ONLY

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!