Deconstructing SubSeven, the Trojan Horse of Choice

The popularity of the SubSeven Trojan and the general vulnerability of many systems on the Internet, particularly those of home users, require an awareness of the dangers of being infected with this malicious program. By understanding what SubSeven is, how it works and how to defend a system...
By
Jamie Crapanzano
January 8, 2001

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg