[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-disclosure] Re: Help put a stop to incompetent computer forensics
- To: full-disclosure@xxxxxxxxxxxxxxxxx
- Subject: Re: [Full-disclosure] Re: Help put a stop to incompetent computer forensics
- From: Erik Kamerling <ekamerling@xxxxxxxxxxx>
- Date: Wed, 10 Aug 2005 18:57:14 -0400
Trojan Horse
A computer program that appears to have a useful function, but also has a
hidden and potentially malicious function that evades security mechanisms,
sometimes by exploiting legitimate authorizations of a system entity that
invokes the program.
Copied from the SANS Glossary of Terms Used in Security and Intrusion
Detection.
http://www.sans.org/resources/glossary.php
Best
Erik Kamerling
On Wednesday 10 August 2005 18:43, Jason Coombs wrote:
> I'll do some more work on this and see where it leads. The proposal of
> "backdoor" as the better term just doesn't work, since a backdoor is a
> hidden mechanism for gaining entry or control of a system that is built
> into the system by its creator or some other involved party. An intruder
> may open up a backdoor in a system by altering its programming rather
> than by planting a Trojan, so there needs to be a distinction between
> the two.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/