To install click the Add extension button. That's it.

The source code for the WIKI 2 extension is being checked by specialists of the Mozilla Foundation, Google, and Apple. You could also do it yourself at any point in time.

4,5
Kelly Slayton
Congratulations on this excellent venture… what a great idea!
Alexander Grigorievskiy
I use WIKI 2 every day and almost forgot how the original Wikipedia looks like.
Live Statistics
English Articles
Improved in 24 Hours
Added in 24 Hours
Languages
Recent
Show all languages
What we do. Every page goes through several hundred of perfecting techniques; in live mode. Quite the same Wikipedia. Just better.
.
Leo
Newton
Brights
Milds

From Wikipedia, the free encyclopedia

Gh0st RAT
Developer(s)C.Rufus Security Team
红狼小组
(Hong Lang Xiao Zu)
Preview release
Gh0st RAT Beta 3.6
Written inC++
Operating systemMicrosoft Windows
Available inChinese
TypeTrojan
LicensePublic Domain[1]
Websitehttp://www.15897.com/

Gh0st RAT is a Trojan horse for the Windows platform that the operators of GhostNet used to hack into many sensitive computer networks.[2] It is a cyber spying computer program. The "RAT" part of the name refers to the software's ability to operate as a "Remote Administration Tool".

The GhostNet system disseminates malware to selected recipients via computer code attached to stolen emails and addresses, thereby expanding the network by allowing more computers to be infected.[3] According to the Infowar Monitor (IWM), "GhostNet" infection causes computers to download a Trojan known as "Gh0st RAT" that allows attackers to gain complete, real-time control.[4] Such a computer can be controlled or inspected by its hackers, and the software even has the ability to turn on the camera and audio-recording functions of an infected computer that has such capabilities, enabling monitors to see and hear what goes on in a room. A lesser known variant of Gh0st RAT is Gh0stBins, which possesses the same set of malicious tools, including keylogging and the ability to perform a system reboot.

YouTube Encyclopedic

  • 1/3
    Views:
    42 072
    141 927
    3 644
  • How easy is it to RAT Someone?
  • Remcos RAT Review - The Most Advanced Remote Access Tool
  • Part 1 - Understanding the Traffic Pattern of Ghost RAT

Transcription

See also

References

  1. ^ 此软件无作者,无版权 (This software has no authors and no copyright). Gh0st RAT Beta 2.5 开源-红狼远控
  2. ^ "Cyberspies' code a click away - Simple Google search quickly finds link to software for Ghost RAT program used to target governments". Toronto Star (Canada). Toronto, Ontario, Canada. March 31, 2009. Retrieved 2009-04-04.
  3. ^ Markoff, John (March 28, 2009). "Vast Spy System Loots Computers in 103 Countries". New York Times. Retrieved March 29, 2009.
  4. ^ Harvey, Mike (March 29, 2009). "Chinese hackers 'using ghost network to control embassy computers'". The Times. London. Retrieved March 29, 2009.

External links

This page was last edited on 3 March 2024, at 01:11
Basis of this page is in Wikipedia. Text is available under the CC BY-SA 3.0 Unported License. Non-text media are available under their specified licenses. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc. WIKI 2 is an independent company and has no affiliation with Wikimedia Foundation.