1 / 21

SOFTWARE

SOFTWARE. By: Francisco Rodriguez Karen Lopez Marcela Mireles Marcelo Sanchez Rodrigo Peña Erick Ontiveros. TROJANO / BACKDOOR.

nessa
Download Presentation

SOFTWARE

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. SOFTWARE By: Francisco Rodriguez Karen Lopez Marcela Mireles Marcelo Sanchez Rodrigo Peña Erick Ontiveros

  2. TROJANO / BACKDOOR • Backdoor Trojans , are said to be the new generation of cyber-vandalism, due to its illegal way to infiltrate to servers, personal computers or work stations, therefore being able to take control over these systems.

  3. TROJANO / BACKDOOR • Backdoortrojansaren’tvirusesessencially, they are mostlydescribed as “Remote Control Tools”. • Theynotonly hace self-codification, butalsothey use any Internet media tobetransmitted: e-maill, chat, etc.

  4. TROJANO / BACKDOOR • Eventhougheverydayviruses are sentthroughinfelcted files inside e-mails, manyusersalowthisforseveralreasonsincludingcuriosityorfornothavingtheiroperativesystemsorantivirusesupdated, thismakesthis media themostusedforthe virus creators.

  5. Howtopreventthem: • Firewall. • Update software constantly. (Antiviruses) • Massivemonitoring. • Don’tputobviouspasswordslikebirthdatesornicknames. • Be carefullwithshared folders • Be preventive.

  6. ThreeFamousTrojans / Backdoors • NetBusCreatedby Carl-FredrikNeikter in 1998, whosaid “NetBuswascreatedforpeopletohavefunwithfriends (…)”. Apparentlypeople use itfor more thanjustfun. • Back OrificeWascreatedon 1998 bythe hackers known as theCult of theDeadCow.. • SubSevenWascreated in Germanybythe hacker group S7G or Sub7Germany.

  7. What can Trojans / Backdoors do ? • Extract and sendinformaton of thesystemtothe hacker. • Downloadorsendthecomputer’s files. • Changepasswords. • Stop processes. • Show messageson-screen. • Manipulate mouse, restartthecomputer, resetthehard drive, etc.

  8. UPLOAD AND DOWNLOAD By: Francisco Rodriguez

  9. UPLOAD & DOWNLOAD • Uploading and downloading refer to the two canonical directions (corresponding to send and receive, respectively) that information can move, and further defines such data as being copied and compiled (indicated by the term "loading") to create a complete file, after a period of time. Downloading is distinguished from the related concept of streaming, which indicates a download in which the data is sequentially usable as it downloads, or "streams," and that (typically) the data is not stored.

  10. UPLOAD AND DOWNLOAD • To download is to receive data to a local system from a remote system, such as a webserver, FTP server, email server, or other similar systems. A download is any file that is offered for downloading or that has been downloaded.

  11. UPLOAD AND DOWNLOAD • The inverse operation, uploading, is the sending of data from a local system to a remote system, such as a server, or peer, with the intent that the remote system should save a copy of whatever is being transferred.

  12. Assistant By: Rodrigo Peña

  13. Personal Assistant • The assistant, or also called personal digital assistant (PDA), is a small computer that can fit perfectly into a pocket, they may have image and sound capabilities, so they can also de used as mobile phones, web browsers, or portable media players.

  14. Typical features • These devices usually have these features: • Touch screen • Memory cards • Wired and wireless conectivity • Synchronization

  15. Uses • Automobile navigation: due to GPS (Global Positioning System) • Medical uses: because patients can record symptoms, more easily. • People with disabilities: because they are easy to operate

  16. Graphical User Interface • A program interface that takes advantage of the computer's graphics capabilities to make the program easier to use. Well-designed graphical user interfaces can free the user from learning complex command languages

  17. Pontier • A symbol that appears on the display screen and that you move to select objects and commands. Usually, the pointer appears as a small angled arrow. Text -processing applications, however, use an I-beam pointer that is shaped like a capital I.

  18. Ponting Device • A device, such as a mouse or trackball, that enables you to select objects on the display screen.

  19. Icons • Small pictures that represent commands, files, or windows. By moving the pointer to the icon and pressing a mouse button, you can execute a command or convert the icon into a window.

  20. Desktop • The area on the display screen where icons are grouped is often referred to as the desktop because the icons are intended to represent real objects on a real desktop.

  21. Windows • You can divide the screen into different areas. In each window, you can run a different program or display a different file. You can move windows around the display screen, and change their shape and size.

More Related