Talk With an Expert

NetBus 2.1, Is It Still a Trojan Horse or an Actual Valid Remote Control Administration Tool?

NetBus 2.1, Is It Still a Trojan Horse or an Actual Valid Remote Control Administration Tool? (PDF, 1.95MB)Published: 21 Aug, 2001
Created by
Seth Kulakow

An organization must have a good sound security policy that users follow. It will tell users what they can and cannot do. In addition, users must be educated on what could be viewed as a threat not only from the exterior but also interior attacks. Many users feel that they are safe within the interior of a network and freely open internal and external email attachments without any hesitation, against security policy. So not only educate your users on what they are allowed or not allowed to do within your network but keep them up to date on the latest attack attempts and what to look out for.