The name is a play on Microsoft's Back Office system, but Back Orifice
makes any infected computer wide open to crackers, who can watch what happens on the victim's screen and can edit and delete files stored within that computer, all without the owner knowing.
It's similar to the much more publicized Back Orifice
Hackers develop programs like the Back Orifice
to expose the weaknesses in products that are sold to the public as being safe and secure when they are not.
Using the WebTrends AutoSync technology, the Back Orifice
2000 vulnerability tests have been deployed to all current registered and trial WebTrends Security Analyzer customers, allowing them to check for and fix the systems that have BO2K installed.
DAYTON, Ohio, July 14 /PRNewswire/ -- Allegro, an outsourced messaging company, announced it has protected over 1,000 businesses from a new computer security threat known as Back Orifice
On the heels of yesterday's announcement that it had decoded the newest threat to networks and PCs, Internet Security Systems (ISS) (NASDAQ: ISSX) today announced a critical countermeasure for Back Orifice
Although Back Orifice
2000 has been touted as a legitimate network administration tool, our customers have asked us to detect and disable its unauthorized use with our InoculateIT antivirus and SessionWall-3 intrusion detection solutions," said Gordon Twilegar, CA director of security strategy.
the leader in centrally managed virus protection and content filtering, today announced that it has taken steps to ensure that computer users are protected from Back Orifice
2000, the newest trojan program known as the "hacker agent.
July 12 /PRNewswire/ -- Symantec Corporation (Nasdaq: SYMC) today announced that the researchers at the Symantec AntiVirus Research Center (SARC) have analyzed and posted a virus definition set to protect against the Back Orifice
2000 Trojan Horse.
2 intrusion detection software solution now identifies and combats threats from the newly released Back Orifice