This remote administration tool originated in January 2004. The author is someone, hiding behind a nickname ".c0m". Several versions can be found in the Internet. The main purpose of this program is providing a remote attacker the control of your computer. There are several ways of infecting a machine with a RAT program. Most attacks are performed through the File and Print Sharing and the e-mail. While the first way is mostly used to infect a less experienced user, the e-mail can be used to attack a well protected machine. The possibilities of RAT programs can vary, but the main principle is quite simple: an installed "server" allows the hacker to gain access to your computer via a "client" in his machine.
.96mm 1.03 properties
• Allows remote user connection
• Hides from the user
• Stays resident in background
It might be that we are affiliated with any of our recommended products. Full disclosure can be found in
our Agreement of Use.