Thursday, November 15, 2012

What is RAT Or Remote Access Trojan ?

What is RAT Or Remote Access Trojan ? - is the article you are looking for, and we have it available in Specs Phone, well now we will discuss the article entitled What is RAT Or Remote Access Trojan ?, we has collected a lot of data to make this article, so we hope to convey information in a complete enough for you, all right please continue reading to completion:

This is about : What is RAT Or Remote Access Trojan ?
And this article : What is RAT Or Remote Access Trojan ?
Article Hacking, Article RAT,

You can also see our article on:


remote access trojan or rat
RAT stands for Remote Access Trojan or Remote Administration Tool. It is one of the most dangerous virus out their over the internet. Hacker can use RAT to get complete control to your computer. He can do basically anything with your computer. Using http://manmaza.blogspot.com /search/label/RAT" target="_blank">RAT hacker can install http://manmaza.blogspot.com /search/label/KEYLOGGER" target="_blank">keylogger and other malicious viruses remotely to your computer, infect files on your system and more. In this post i will tell you about what hacker can do with your computer using RAT and tell you about some commonly use RAT by hackers.

 What is RAT ?

As i have told you in my introduction paragraph RAT is Remote Access trojan. It is a peace of software or program which hacker uses to get complete control of your computer. It can be send to you in form of images, videos or any other files. Their are some RAT that even your antivirus software can not detect.  So always be sure about what you are downloading from the internet and never save or download files that anonymous user send you  over the mail or in chat room.

 What You Can do With RAT ?

Once a RAT is installed on any computer hacker can do almost anything with that computer. Some malicious task that you can do with RAT are listed below:
  • Infecting Files
  • Installing Keyloggers
  • Controlling Computer
  • Remotely start webcam, sounds, movies etc
  • Using your PC to attack Website (DDOS)
  • View Screen

 Harmless RAT or Good RAT

As you have seen how harmfull RAT are for your computer, but their are some good RAT which some of you might be using daily. You might have heard of TeamViewer, it is a software which you use to control some one's computer with his permission for file transfer, sharing your screen and more.

 Some Commonly Used RAT

  • ProRAT
  • CyberGate RAT
  • DarkComet RAT

More Hacking Tricks & Tips


    Articles What is RAT Or Remote Access Trojan ? finished we discussed

    A few of our information about the What is RAT Or Remote Access Trojan ?, may be useful to you in finding references about the latest gadgets.

    You've finished reading an article What is RAT Or Remote Access Trojan ? and many articles about Specs Phone in our blog this, please read it. and url link of this article is https://manmaza.blogspot.com/2012/11/what-is-rat-or-remote-access-trojan.html Hopefully discussion articles on could be useful and provide more knowledge for your life and family.

    Tag : , ,
    Share on Facebook
    Share on Twitter
    Share on Google+
    Tags :

    Related : What is RAT Or Remote Access Trojan ?

    • Finding Ip Address Of A Website Using Command Prompt Or CMDIn this tutorial i will teach you to find Ip Address of any website using Command Prompt or in short CMD. Using IP Address you can find location of the website serv ...
    • How to change IP addressPeople want to change  IP address for a variety of reasons. The Internet Protocol (IP) address is popularly known as the IP address. This private address is used by ...
    • Make A Virus That Disable MouseI had previously posted on making different batch files like http://manmaza.blogspot.com /2011/12/advance-matrix-effects.html" target="_blank">matrix effect, http://ma ...
    • What Is Keylogger And How To Be Safe From Keyloggers?In this tutorial i am going to talk about the most use piece of software besides from RAT by hackers to observe your activities on your computer and that is keyloggers.& ...
    • Top 6 Black Hat Hackers In The WorldThere are two types of hackers. First one are good hackers who are known as "white hat" hackers and another one which we will be talking about today are called "black ha ...

    0 comments:

    Post a Comment