Jump to content

Welcome to Geeks to Go - Register now for FREE

Geeks To Go is a helpful hub, where thousands of volunteer geeks quickly serve friendly answers and support. Check out the forums and get free advice from the experts. Register now to gain access to all of our features, it's FREE and only takes one minute. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more.

Create Account How it Works

trojan diverter

  • Please log in to reply



    New Member

  • Member
  • Pip
  • 1 posts
whats the chance of finding a program that will divert a trojan back to the system that sent it
  • 0





  • Member
  • PipPipPip
  • 279 posts
Highly unlikely unless you write it yourself.
But the question is why would you want to? The person sending you the trojan is most likely smart enough to have taken control of a few dozen machines (Zombies). That said, the machine that sent you the trojan is most likely already infected anyway.

Trojans work like this, there are 2 parts a client and a server. The client is used by the bad guy to access the server portion of the program. He sends you the server and then when it is executed by some predetermined command he uss the client to do whatever it is that he was wanting to do. Sending the server back to him does no good at all.

Better to read all email headers with the infected program and contact the ISP.
  • 0

Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP