Description: The methods of intruders in an information system using software for remote administration. A classification of threats to remote access, an analysis of possible errors when installing programs for remote administration. Consider ways to install hidden programs for remote administration and methods to counter this threat.
Keywords:
program of remote access, unauthorized access, remote administration, the threat of information