Apple,Google,Yahoo,Microsoft,Wikipedia,Bing

Monday, 23 January 2012

ANKIT FADIA(REVERSE ENGINEERING)



  • What is Reverse Code Engineering?

"Reverse Engineering (RE) is the process of discovering the technological principles of a mechanical application through analysis of its structure, function and operation". Basically, Reverse Code Engineering (RCE) is the application of the reverse engineering process to software - in other words, analyzing a program in order to understand how it works. Reverse engineering is largely focused on the windows platform as its mostly used to analyse closed source programs; however, reversing under Linux is also popular for inspecting buffer overflows, closed-source Linux applications, and hostile Windows programs (without the risk of running them).

  • Installation and Distribution


Trojan Horse can be installed through the following methods:
  • Software downloads.
  • Bundling (e.g. a trojan horse included as part of a software application downloaded from a file sharing network).
  • Email Attachments.
  • Websites containing executable content (e.g., a Trojan horse in the form of an ActiveX control).
  • Application exploits (e.g., flaws in a Web browser, media player, instant-messaging client, or other software that can be exploited to allow installation of a Trojan horse).

No comments: