Trojan Horses
Remote access management that enable users to access a computer and manage it from afar
More often concealed in other software that is downloaded over Internet
- Common carriers: Music and video files shared on Internet sites
Undetected by even the best antivirus software
Major Trojans
- Back Orifice: attacked Windows servers
- Gave the attacker the same right as the administrator
- Morphed into tools such as MoSucker and Optix Pro