Wanna know why my thread about privacy is important? To keep people using the below described techniques from finding your confidential information.

I have some really cool software that if I install them on someone's comp I can then monitor their activity from my own. I can see their current computer with screencap, and even the thread id's of software running so I can remotely suspend or terminate programs they are running. I can send them popup error message boxes, cause their CD-tray to open, even download any file off their comp to my own, or upload anything to their comp, or even delete files remotely. I can edit their registry remotely. I can disable the Windows start button task bar or even their full desktop, or I can deactivate their keyboard or mouse, or take control or their keyboard or mouse remotely. I can activate their webcam and spy on them, or their microphone and record sound, or log their keystrokes (either in real time to your computer, or record them to a file on their computer, and then dump the keylog to your computer later). A couple of these programs even have a full remote desktop mode where you can take full control of their computer in real time.

None of these progs I'm speaking of are a virus or a worm so it can't automatically propagate. It's just ordinary spyware/hackware so I'd have to trojan it (make it look like a desirable program) in order to trick someone to run it. It definitely ain't Zeus, but it sure is a very powerful program. You either have to get someone to run the EXE file that looks like something else, or you have to bind it to a real good program's EXE file (put them both in a self extracting archive file and have a batch file run uppon extracting that runs the hackware installer and the legit program before deleting itself, said batch file) and then trojan the binded file so it looks like it's ONLY the desired program.

All these programs have a way autostart at reboot (often using more than the normal windows/curentversion/run registry entry) , some have a way to restart themselves uppon successful shutdown via TaskManager, and some even hide themselves from the processes list in TaskManager because the'yve been programmed by advanced techniques that actually causes them to run in the same memory space as explorer.exe (the main OS display that has the desktop etc) which is called process injection.

Some of the older such programs were server end on victim's comp, and client end on hacker's comp. This had the disadvantage of not knowing where all the victim servers were and so they would be programmed to email you victim's ip address because before being deployed you'd configure them with your email address. This simply served to make it impossible for hackers to remain anon, with a paper trail like this. Also if you didn't configure your hackware server to use a password before (or remotely with the client software shortly after infecting your victim), any other hacker who also knew your victim's IP address could hijack your hacking operation and steal your victims away from you by then putting their own password on.

The newer ones have a preconfigured client that is put on each victim's computer (and your own computer has the server), that you have to configure with your own IP address (making victim stealing much less likely, even without using a password, though a password is also allowed in addition). Also as this doesn't leave an email trail for authorities to find, it makes it more difficult to be caught by the cops for hacking like this. As victims' computers connect to yours, the client manager on your server show's who's connected and lets you doubleclick on these entries to bring up a control panel for hacking that victim.


Just a few names of such software are:
Netbus
Sub 7
Bifrost
Cybergate
Back Orifice 2000

There's TONS more though.