I can't believe this... Andrew, please check the dictionary second definition of Trojan before proceeding. A "remote access tool" is ssh, VNC and others and these are definitely not trojans. Get a grip. Trojan Horse noun noun Greek Mythology a hollow wooden statue of a horse in which the Greeks concealed themselves in order to enter Troy. • (also Trojan horse) figurative a person or thing intended secretly to undermine or bring about the downfall of an enemy or opponent : the rebels may use this peace accord as a Trojan horse to try and take over. • (also Trojan horse) Computing a program designed to breach the security of a computer system while ostensibly performing some innocuous function. Tom On Dec 6, 2011, at 6:49 PM, andrew.wallace wrote:
A trojan can be used for good if in the right hands as a remote access tool for business use.
Andrew
________________________________ From: Bryan Fields <Bryan@bryanfields.net> To: "nanog@nanog.org" <nanog@nanog.org> Sent: Tuesday, December 6, 2011 11:24 PM Subject: Re: [fyodor@insecure.org: C|Net Download.Com is now bundling Nmap with malware!]
On 12/6/2011 13:30, andrew.wallace wrote:
It could be argued that Nmap is malware, and such software has already been called to be made illegal.
If I was Cnet, I would stop distributing his software altogether.
If this is not trolling and you actually believe this, just wow.....
Nmap is just a tool, and any tool can be misused by people for criminal acts. It's really no different than a gun in that regard. Both are incredibly useful things in the right hands, mere tools to further security. However in the wrong hands they can be used to commit crimes and break other peoples security.
-- Bryan Fields
727-409-1194 - Voice 727-214-2508 - Fax http://bryanfields.net