System information

Threats to computer security 33
TYPE
NAME
DESCRIPTION
Server-FTP
FTP servers
These programs perform the
functions of FTP servers. Intruders
install them on the users' computers
to obtain remote access via the FTP
protocol.
Server-Proxy
Proxy servers
These programs perform the
functions of proxy servers. Intruders
install them on the users' computers
to send spam using the identity of the
user.
Server-Telnet
Telnet servers
These programs perform the
functions of Telnet servers. Intruders
install them on the users' computers
to obtain remote access via Telnet
protocol.
Server-Web
Web servers
These programs perform the
functions of web servers. Intruders
install them on the users' computers
to obtain remote access via HTTP
protocol.
RiskTool
Local computer tools
These tools provide users with
additional functionality and are used
within the user's computer only, They
allow the hacker to hide files, hide the
windows of active applications, or to
close active processes.
NetTool
Network tools
These tools allow a computer user to
remotely manage other computers on
the network: for example, to restart
them, find open ports, or run
programs installed on these
computers.
Client-P2P
Peer-to-peer client
programs
These programs are used for using
peer-to-peer networks. Intruders can
use them to spread malware
programs.