English Deutsch Français Italiano Español Português 繁體中文 Bahasa Indonesia Tiếng Việt ภาษาไทย
All categories

2 answers

There are perfectly legitimate reasons for doing that. However the knowledge could be used for evil purposes too. You should heve given more information so we wouldn't think you wanted to do something evil. Since criminal masterminds don't post question to places like yahoo answers for the whole world to see i assume your intentions are good, and your question is just badly worded and undetailed.

There are many remote administration tools(that is the nice name for a trojan) available which can do just that. The tools will most likely require that you have access to the pc to install a component(server side software) which your client side software can connect/send commands to.

If there are many computers on the network which use images for relaoding of the harddrive it would be best to install and setup the component on the image.

If you are going to use a trojan (ie the evil equivalent of remote administration) it is best that you write your own since most Anti-virus software will stop widely known off the shelf trojans, days after they are released unless the trojan can disable or block the antivirus. If you write your own and limit the number of infections your trojan will last longer.

Your question makes it sound like you want to do something very illegal, something which you can goto jail for. If you get caught and convicted of installing something malicious on someones computer without thier knowledge it is very likely you will go to jail where people will upload things into your anus without your permission. Script kiddies have the same level of respect in prison as peadophiles, which is none at all.

If you want to uplaod the files illegally without using the machine then you should write tools to test for vulnerablities in their operating systems or like script kiddies download them. After you know the vulnerablities you could upload the files through these vulnerablities depending of course on the vulnerablity.

Most people are pretty stupid so pack your evil file into an execuatable and mail it to them. when they execute the file your evil file should be unpacked and commanded to run by the main executable. Just make sure the main executable is useful like a mario game or something. Alternativly pack the stuff into a excel document( I am not sure how but there is a newly discoverd flaw in Excel which may allow you to do some evil stuff. since it's new it will be about 3 weeks before microsoft releases a patch for it, and the patch will only work for legal version of office).

I have never done any of this stuff. My answer is most likely not 100% correct since i am no expert. Best you ask at network admin forum or jhacker forum depending on your intentions.

2006-06-17 10:14:31 · answer #1 · answered by jason b 5 · 1 0

yeah take your rubbish trojans elsewhere this question is being reported.!!

2006-06-17 07:39:15 · answer #2 · answered by Paultech 7 · 0 0

fedest.com, questions and answers