Skip to Content
Developer's Guide to Web Application Security
book

Developer's Guide to Web Application Security

by Michael Cross
April 2011
Intermediate to advanced
500 pages
16h 12m
English
Syngress
Content preview from Developer's Guide to Web Application Security
Two common Trojan horse remote control programs are Back Orifice and NetBus.
Back Orifice consists of two key pieces: a client application and a server applica-
tion. The way Back Orifice works is that the client application runs on one
machine and the server application runs on a different machine. The client appli-
cation connects to another machine using the server application. However, the
only way for the server application of Back Orifice to be installed on a machine is
to be deliberately installed. This means the hacker has to install the server appli-
cation on the target machine, or trick the user of the target machine into doing
so. Hence, the ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Security for Web Developers

Security for Web Developers

John Paul Mueller
Securing Web Applications

Securing Web Applications

Stephen Gates, Allan Liska

Publisher Resources

ISBN: 9781597490610