Topic: COMPUTER - on December 9, 2003 at 5:32:04 PM CET
Hackers Steal From Pirates, to No Good End
The people who design rogue programs that take over computers from afar are now applying the tactic that made music pirating programs so effective - and the Internet may never be the same.
The rogue programs, known generically as "Trojan horses," have enabled pornographers and others to mask their identities by using unwitting people's computers as relay stations. It had been assumed that diligent investigators could ultimately shut down a system by identifying the server computer used as the initial launching pad. But now a researcher has determined that a new kind of Trojan horse could make the systems virtually unstoppable.
... Comment