Sunday, August 14, 2011

Help with understanding backdoor trojans and the process of placement?

Through careless clicking, I recently had a pc infected with a backdoor. The pc has since been replaced. Not counting possibly tainted cd-rs or flash players-- how could the hacker that placed the backdoor access my new computer? What information would they need? Is this even possible? Thanks for sharing, in advance.

No comments:

Post a Comment