Talk With an Expert

Deconstructing SubSeven, the Trojan Horse of Choice

Deconstructing SubSeven, the Trojan Horse of Choice (PDF, 1.68MB)Published: 08 Jan, 2001
Created by
Jamie Crapanzano

The popularity of the SubSeven Trojan and the general vulnerability of many systems on the Internet, particularly those of home users, require an awareness of the dangers of being infected with this malicious program. By understanding what SubSeven is, how it works and how to defend a system against it, personal computer users are able to shift their status from that of probable victims to guardians of impermeable systems and champions of a more secure Internet.