X hits on this document





108 / 120

brilliant plan of putting 40 of their best soldiers into the body of a large wooden horse

while the rest of the army sailed away out of sight. The Trojans, assuming that the

Greeks had given up, pulled the horse into their city as a trophy of their victory. As night

fell over the city of Troy, the Greek army sailed back to shore. Meanwhile, the soldiers in

the Trojan horse silenced some guards and opened the gates—allowing the Greek army to

flood in and take the city by surprise.

So what does all this have to do with software? Not too surprising, a Trojan

software program is one that is not entirely what it seems. For example, imagine a

program is offered for free on the Internet that claims to be able to convert audio files

between different formats. The program fits the needs of many, and is definitely the right

price, so it has a large install base. What users of the program are not told is that while

the program is performing its advertised functions, it will perform other annoying or

malicious tasks in the background such as: scanning the system for sensitive information

and uploading it to a rogue site, affecting the stability and performance of the system by

doing repeated expensive operations.

In 1996, Mark Russinovich founded a company called “Winternals Software”

where he was the chief software architect on a comprehensive suite of tools for

diagnosing, debugging, and repairing Windows® systems and applications [46]. Mark's

company has since been purchased by Microsoft and his suite of tools have been

rebranded “Windows Sysinternals” and are offered for free on Microsoft Technet. An

example of one of the more powerful tools in the Sysinternals suite is the Process


Document info
Document views195
Page views196
Page last viewedMon Oct 24 05:19:44 UTC 2016