--------------------Okay lets start with the basic bastard trojan-----------------------
------------------------------------------- --------------- ------------------------------------------
-------------------------------------------A Trojan:---------------------------------------------
---------------------------------------- --- - - - - - - -
First of all there is a lot of myths and legends going
around about people attacking your computer stealing
your credit card etc. that is technicly a load of crap. In order
for someone to access your computer using tools such as Sub Seven
and Back Orifice you need to have the trojan which gives them access
on your hard drive *and* boot it up. How you get the trojan is simple,
you either download an attachment or software and *execute* it.
e.g. Ever had a file that when you click on does jack
Sh*t? Well unless you knoww exactly what it is then it may be a trojan.
---------------------------------How it does it works?:---------------------------------------
--------------------------------- - - - - - - - - - - - - - - - - -
Once the attachment (or software) has been
executed it make a copy of itself (sometimes) and puts a registry
key in to make it boot up with windows (and it IT NOT in the start up
folder so be carefull).
------------------------------------------The
Keys:----------------------------------------------
---------------------------------- - - - - - - - -
Right these keys are initialized at windows startup,
namely before
the desktop. I will advise you to be very carefull when deleting registry
keys!.To get in to the registry just go to Run (start menu) and then
type "regedit" (without the speach marks)
Keys:
HKEY_CURRENT_USER/Software/Microsoft/Windows/CurrentVersion/Run
and
HKEY_CURRENT_MACHINE/SOFTWARE/Microsoft/Windows/CurrentVersion/Run
also note: in the second key when you get to windows/currentversion,
in
the right box a list of stuff will come up. This aslo holds who your
computer is registered to (an old hackers trick ;)) so if you want
have a bit of fun with that :) but don't mess aroubd with it to much.
Win.ini
The trojan may also boot up uthrough the Win.ini file (Run, Win.ini)
(once again BE CAREFULL WHAT YOU DELETE!). Serach for stuff you think
is suspisious and if you're 100% sure that isn't something you need
(IE: Tojan) then delete it.
Another Way:
If you arn't confiednt enough to mess around with the win.ini or the
registry try getting a FireWall, they will bloak unauthorized access
to your computer.