Posted 08 August 2005 - 08:52 PM
Posted 08 August 2005 - 10:45 PM
But the question is why would you want to? The person sending you the trojan is most likely smart enough to have taken control of a few dozen machines (Zombies). That said, the machine that sent you the trojan is most likely already infected anyway.
Trojans work like this, there are 2 parts a client and a server. The client is used by the bad guy to access the server portion of the program. He sends you the server and then when it is executed by some predetermined command he uss the client to do whatever it is that he was wanting to do. Sending the server back to him does no good at all.
Better to read all email headers with the infected program and contact the ISP.
0 user(s) are reading this topic
0 members, 0 guests, 0 anonymous users