1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Reika [66]
3 years ago
10

Explain in your own words how remote-access Trojans (RATs) work. How can these be used by attackers? How would a network adminis

trator know if one is on his/her network?
Computers and Technology
1 answer:
LUCKY_DIMON [66]3 years ago
4 0

Answer: Remote Access Trojans (RATs) is the malware that is used by the hackers to attack the computer and operating system remotely.The working of RATs is done by download the malware and executing it to create a server .After the server is created ,hacker sends this server along with a crypter to eliminate the antivirus program's function present in the user's system.

Thus, RAT gets invoked in the system of the user and the hacker can control the user's system .Attacker can hack the complete functioning of the user's system and can steal, destroy ,execute etc any confidential data and application.

The user or the network administrator can get to know about the RAT's activity by steps like checking the open port, checking the activities through Task Manager of Windows, observing any unusual activity and appearance of the display screen etc.

You might be interested in
c++ design a class named myinteger which models integers. interesting properties of the value can be determined. include these m
klemol [59]

Answer:

  1. #include <iostream>
  2. using namespace std;
  3. class myinteger {
  4.    
  5.    private:
  6.        int value;
  7.        
  8.    public:
  9.        myinteger(int x){
  10.            value = x;
  11.        }
  12.        
  13.       int getValue(){
  14.           return value;
  15.       }
  16.        
  17. };
  18. int main()
  19. {
  20.    myinteger obj(4);
  21.    cout<< obj.getValue();
  22.    return 0;
  23. }

Explanation:

Firstly, we use class keyword to create a class named myinteger (Line 5). Define a private scope data field named value in integer type (Line 7 - 8).

Next, we proceed to define a constructor (Line 11 - 13) and a getter method for value (Line 15 -17) in public scope. The constructor will accept one input x and set it to data field, x. The getter method will return the data field x whenever it is called.

We test our class by creating an object from the class (Line 23) by passing a number of 4 as argument. And when we use the object to call the getValue method, 4 will be printed as output.

4 0
4 years ago
Imagine you are asked to set up a network for connecting 50 computers in an office environment. Discuss the type of network you
Contact [7]
Here's an outline

(I suck at writing)

hope this helps!!

7 0
3 years ago
All of the Internet in your country disappears. What happens next?
Talja [164]

Answer:

It is most likely that in a tech surrounded environment there would be an apacolypse, not necessarily a man hunting man apacolypse but it would cause a huge panic throughout that country because government could not communicate which is what leaves people with a safeplace.

Explanation:

please mark as brainliest xx hope it helps <3

if you really like this topic watch into the forest on netflix, it has the same premise except its not that internet disappears its electricity.

4 0
3 years ago
_______________, such as BASIC, Python, Java, Prolog, and C , make the programming process easier by replacing unintelligible st
musickatia [10]

Answer:

High level Languages

Explanation:

High level languages are made so that the byte code, Assembly code that computers can understand should be converted into a higher level human understandable languages such as Python,C++. Also, remember that the compilers of these languages such as Visual studio ultimately converts the high level code into low level code ( Assembly code ) that computers can understand.

8 0
3 years ago
Your reputation and credibility will be immediately destroyed if your website contains?
lora16 [44]

Answer:

B

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • What's is the contribution of technology to the country?
    15·1 answer
  • A variable of the data type arrays is storing 10 quantities. What is true about these quantities?
    10·1 answer
  • If you want to distribute a formatted Microsoft word document to people who don't have word save it as a __file
    5·1 answer
  • If you wish to collect data from two related websites with different domains in a single google analytics property, what feature
    8·1 answer
  • landon starts his computer and gets message, hard drive is not found. He was watching a movie the previous night, what might the
    6·1 answer
  • Why was the cooper black font made?
    5·1 answer
  • Help help help help​
    6·1 answer
  • Im lonnnelllly........................who want to date
    11·1 answer
  • All of the following are examples of software, except:
    5·2 answers
  • The Next Einstein Initiative and the ________ Institute for Mathematical Sciences bring bright young learners and the best lectu
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!