Sub Seven Virus Essay Research Paper Imagine

Sub Seven Virus Essay, Research PaperImagine this, you? re at place playing on the computing machine when all of a sudden your cadmium thrust opens. You brush it off as it were nil unusual but so a few proceedingss go by and out of nowhere you printer starts publishing a page that says & # 8220 ; you have a virus that allows people entire entree your files. & # 8221 ; You begin to panic when a message window pops up and it? s the individual that printed that out.

He tells you that the virus you have is called the subseven virus.I didn & # 8217 ; Ts have to hard of a clip conceive ofing that state of affairs because it truly happened to me. The cat that informed me of holding the virus told me where I could download the plan to entree people files. So I, being the funny type downloaded and proceeded to acquire into people & # 8217 ; s computing machines. I have to acknowledge it is pretty merriment messing with people. I didn? t delete anyone? s files I merely looked about and when I was done holding a small merriment with the individual I told them that they had the subseven virus.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

The operating plan was good developed. It has a batch of options some of these options include tossing the victim? s screen, take control of mouse, uncovering cached watchwords, unfastened cadmium read-only memory thrust, disable keyboard, turn proctor off, and much much more. My personal favourite option was the ability to entree the c-drive and see what the individual has on their computing machine.Subseven was discovered in May 1999. The Godhead calls himself? Mobman. ? Subseven is a Windows 9x Internet Backdoor Trojan.

When running it gives virtually limitless entree to the system over the Internet to anyone running the appropriate client plan. Subseven uses a individual? s information science reference to entree the system. It installs three files onto the computing machine. The first being NODLL.EXE which is installed into the Windowss booklet and is used to lade the Trojan waiter. The following file is known as BackDoor-G.srv. This 1 is besides installed into the Windowss booklet and is the existent Trojan that receives and carries out the bids from the client plan.

This file is normally the first file the user gets. The following file is used by the Trojan waiter plan to watch for connexions to the cyberspace from the client package. This file is identified as BackDoor-G.dll. The Trojan besides registers the file extension.

dl as an feasible file type that can be run by the operating system merely like any.exe file. This allows the aggressor to download files onto the victims system and run them. Because the extension is non normally associated with feasible files some virus scanners will non scan these files and the victim will non surmise these files.You may be inquiring yourself? How can I state if I have the virus? ? Well here are some indicants that you? ve been infected.

Files copied to the local system, alterations to system register, and unusual or unexplained duologue boxes on the machine with conversation or key strokes entered without your instructing to make so.I hope my study gave you some new penetration on a slippery small virus that can truly mess up your computing machine. I have added the full list of options on the subseven plan.Fun Manager& # 8212 ; & # 8212 ; & # 8212 ; & # 8211 ;1. Open Web Browser to stipulate location.2. Restart Windows.3.

Reverse Mouse buttons.4. Hide Mouse Pointer.5. Move Mouse.6.

Mouse Trail Config.7. Set Volume.8. Record Sound file from distant mic.9. Change Windows Colors / Restore.

10. Hang up Internet Connection.11.

Change Time.12. Change Date.13. Change Screen declaration.

14. Hide Desktop Icons / Show15. Hide Start Button / Show16. Hide taskbar / Show17. Opne CD-ROM Drive / Close18.

Beep computing machine Speaker / Stop19. Turn Monitor Off / On20. Disable CTRL+ALT+DEL / Enable21. Turn on Scroll Lock / Off22. Turn on Caps Locl / Off23. Turn on Num Lock / OffConnection Manager& # 8212 ; & # 8212 ; & # 8212 ; & # 8212 ; & # 8212 ; & # 8212 ;1. Connect / Disconnect2.

IP Scanner3. IP Address book4. Get Computer Name5. Get User Name6. Get Windows and System Folder Names7. Get Computer Company8. Get Windows Version9.

Get Windows Platform10. Get Current Resolution11. Get DirectX Version12. Get Current Bytes per Pixel scenes13. Get CPU Vendor14. Get CPU Speed15. Get Difficult Drive Size16.

Get Difficult Drive Free Space17. Change Server Port18. Set Server Password19. Update Waiter20. Close Server21. Remove Server22.

ICQ Pager Connection Notify23. IRC Connection Notify24. E-Mail Connection NotifyKeyboard Manager& # 8212 ; & # 8212 ; & # 8212 ; & # 8212 ; & # 8212 ; -1.

Enable Key Logger / Disable2. Open Key Logger in a distant Window3. Unclutter the Key Logger Windows4. Roll up Keys pressed while Offline5. Open Chat Victim + Controller6.

Open Chat among all connectedAccountants& # 8212 ; & # 8212 ; & # 8212 ; & # 8211 ;1. Windows Pop-up Message Manager2. Disable Keyboard3. Send Keys to a distant WindowMisc. Manager& # 8212 ; & # 8212 ; & # 8212 ; & # 8212 ; -1.

Full Screen Capture2. Continuous Thumbnail Capture3. Flip Screen4. Open FTP Server5. Find Files6.

Capture from Computer Camera7. List Recorded Passwords8. List Cached Passwords9. Clear Password List10.

Register Editor11. Send Text ot PrinterFile Manager& # 8212 ; & # 8212 ; & # 8212 ; & # 8212 ; -1. Show files/folders and navigate2. List Drives3. Execute Application4. Enter Manual Command5. Type way Manually6. Download files7.

Upload files8. Get File Size9. Delete File10. Play *.WAV11.

Set Wallpaper12. Print *.TXT*.RTF file13. Show ImageWindow Manager& # 8212 ; & # 8212 ; & # 8212 ; & # 8212 ; & # 8211 ;1.

List seeable Windowss2. List All Active Applications3. Focus on Window4. Close Window5. Disable Ten ( close ) button6. Hide a Window from position.

7. Show a Hidden Window8. Disable Window9. Enable Disabled WindowOptions Menu& # 8212 ; & # 8212 ; & # 8212 ; & # 8212 ; -1. Set Quality of Full Screen Capture2. Set Quality of Thumbnail Capture3.

Set Chat font size and Colorss4. Set Client & # 8217 ; s User Name5. Set local & # 8216 ; Download & # 8217 ; Directory6. Set Quick Help7. Set Client Skin8.

Set Fun Manager SkinEdit Server& # 8212 ; & # 8212 ; & # 8212 ; & # 8211 ;1. PreSet Target Port2. PreSet waiter Password3. Attach EXE File4. PreSet file name after installing5.

PreSet Registry Key6. PreSet Autostart Method:Registry & # 8211 ; system files & # 8211 ; get down up booklets7. PreSet Fake mistake message8.

PreSet Connection Notify Username9. PreSet Connection Notify ICQ #10. PreSet Connection Notify Electronic mail11.

PreSet Connection Notify IRC Chan.12. PreSet IRC Port13. Change Server *.exe Icon


I'm Ruth!

Would you like to get a custom essay? How about receiving a customized one?

Check it out