TITLE

Bad rap for Back Orifice 2000?

AUTHOR(S)
Messmer, Ellen
PUB. DATE
July 1999
SOURCE
Network World;07/19/99, Vol. 16 Issue 29, p1
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Reports that the computer hacker group called Cult of the Dead Cow posted Back Orifice 2000, a free tool for seizing control of an NT-based computer network. Promotion of the program for legitimate use by network managers for remote administration; Highlights of the Def Con hacker convention; Ability of Orifice 2000 users to secretly control any Windows desktop or server on the which the server component has been installed.
ACCESSION #
2709446

 

Related Articles

  • Back Orifice is back and it's badder than ever. Schwartau, Winn // Network World;08/02/99, Vol. 16 Issue 31, p35 

    Reports on the launching during the 1999 Def Con of the Back Orifice 2000 virus by the Cult of the Dead Cow (CDC), an organization of computer hackers. Revelation of the lack of security in Windows NT and other Microsoft products; Prevention of computer viruses; Plans to sue CDC.

  • Hacknight. TORSSON, PALLE // Journal Nordic Museology / Nordisk Museologi;2014, Issue 2, p118 

    The article focuses on a hacknight organized by the hackerspace Sparvnästet for around-the-clock conference among computer hackers held in Stockholm, Sweden. Topics covered include the role of the National Museum of Science and Technology of Sweden in the event, and the approach taken by the...

  • If your PC has BO, try Toilet Paper, other software. Machrone, Bill // PC Week;08/24/98, Vol. 15 Issue 34, p53 

    Focuses on Back Orifice, an application developed by the Cult of the Dead Cow which installs itself as a server on one's computer and allows remote access and control. Computers which are at risk from Back Orifice; Products like Toilet Paper and Antigen 1.0 which can protect against Back...

  • An easier way to crack Windows. Rapoza, Jim // PC Week;08/10/98, Vol. 15 Issue 32, p6 

    Provides information about Back Orifice, an application from the hacker's organization known as the Cult of the Dead Cow. The ability to remotely control Windows 95 and Windows 98 computer systems; How to prevent Back Orifice attacks; How Back Orifice works; Why firewalls are not enough to stop...

  • Has The Dead Cow Gone Corporate? Machrone, Bill // PC Week;07/26/99, Vol. 16 Issue 30, p65 

    Comments on the Cult of the Dead Cow. Launch of Back Orifice 2000; Program improvements from the Back Orifice; Its use as a hacker tool; Examination of the source code.

  • IT held hostage in fight between Microsoft, hackers. Nelson, Matthew // InfoWorld;07/12/99, Vol. 21 Issue 28, p8 

    Focuses on the difference of opinion concerning the Windows security model between Microsoft Corp. and the Cult of the Dead Cow (cDc), an independent group of hackers and programmers that resulted in the release of Back Orifice 2000 of cDc. Capabilities of the product; Purpose of the cDc for...

  • Tracking Chinese Hackers. Long, Timothy // CRN;10/13/2008, Issue 1275, p17 

    The article reports on Chinese hackers, the largest group of hackers in the world. It is said that Scott Henderson tracks hackers throughout China, and administers the Web site www.thedarkvisitor.com. Henderson said that the hackers have hardware and software companies, and have an open Web...

  • Bootrash Uses Volume Boot Record to Exploit Financial Services. Kerner, Sean Michael // eWeek;12/7/2015, p1 

    The article informs that the security vendor FireEye has warned about increased use of a new type of attack known as a bootkit. Topics discussed include use of Bootrash bootkit as part of Nemesis malware to infect organizations by FIN1 financial hacker group, views of Michael Oppenheim,...

  • Protests or Profiteering: The Hack Remains in Same. Coty, Stephen // Technical Support Magazine;Nov/Dec2015, Vol. 7 Issue 5, p24 

    The article discusses the difference between cyber terrorism and hacktivism and offers information on several hacker organizations that claim to be hacktivists such as Anonymous, Cyber Caliphate and Cyber Berkut.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics