Home | About Us | Contact Us | Threats to your Security on the Internet | Products | Support | Online Store


RCT's & RAT's
What are they?
How do I detect them?
How many are there?
What ports do they use?

How do I Remove?
Acid Shivers
Acid Shivers (modified)
Back Orifice
Baron Knight
Big Gluck
Blade Runner
Bugs
Deep Back Orifice
Delta Source
Devil
Doly Trojan
Deep Throat
Deep Throat v2
Executer v1
Executer v2
Girlfriend
Hack 'a' Tack
Master's Paradise
NetBus
NetBus 2 Pro
NetSphere
Sockets 'de Troie
SubSeven (Sub7)
Whack-a-mole (NetBus)
WinCrash

Additional Resources
Latest News
Recommended Books
Recommended Links
Recommended Software

Audit your firewall online, research an IP, email or web site!




How popular is this website? Click here to find out!

The applications discussed within this website are known as 'Remote Control Trojans' (RCT's) or 'Remote Access Trojans' (RAT's), which are designed to allow the remote control of another person's computer over the Internet.

"When a person uses a 'Remote Control Trojan', they are provided with equal, if not greater control of another person's PC than that of the owner sitting at its keyboard." - Don Kelloway


Earthlink

Endorsed by Earthlink

EarthLink brings the magic of the Internet to approximately 4.9 million subscribers every day.

Featured within the paper
"Deconstructing SubSeven, the Trojan Horse of Choice".
One of the Top 25 Papers from the SANS Institute.

Featured on CBC Radio One
Click here to play the audio
*Requires the Real Player plug-in



 
    © Copyright Commodon Communications. All rights reserved.