answersLogoWhite

0


Best Answer

Software that clandestinely resides on a computer, granting remote access and control to an external entity, is known as a "Remote Access Trojan" (RAT). Unlike legitimate remote desktop programs, RATs operate without the user's knowledge or consent. They are often used for nefarious purposes such as data theft, surveillance, or unauthorized system manipulation. Caution is advised when downloading files or clicking on suspicious links to avoid inadvertently installing such software. To encapsulate, a Remote Access Trojan is a covert program that poses significant security risks, and one should employ robust cybersecurity measures to guard against it.

User Avatar

Monika Bush

Lvl 2
7mo ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

12y ago

Its called a R.A.T which is Remote Access Tool. These programs are encrypted allowing them to pass unrecognized through Anti Virus software. AV companies are constantly updating their software as hackers find new and better ways to stay undetected whilst in your computer.

These programs are illegal if used to enter someone's computer without their knowledge or permisson.

This answer is:
User Avatar

User Avatar

Wiki User

12y ago

This is illegal and cannot be answered.

Perhaps a more useful answer:

There are two types of software that do this, the first is illegal the second is not:

1. Certain viruses may do this.

2. Several vendors sell 'Remote Access' software. This is intended for remote support functions, usually so that the HelpDesk in a company can help employees solve problems on their PC. This software has to be installed properly (ie it does not 'hide') and then when the remote technician wants to take over the actual PC user gets a prompt in order to confirm that the take over is to be allowed.

This answer is:
User Avatar

User Avatar

Wiki User

11y ago

using a proxy will hide ur IP, the other is "GoToMyComputer" w\has to be install on both computer, each had a number tell them apart..

This answer is:
User Avatar

User Avatar

Wiki User

12y ago

Rootkit

This answer is:
User Avatar

User Avatar

Wiki User

11y ago

Remote kit

This answer is:
User Avatar

User Avatar

Anonymous

Lvl 1
3y ago

xfgergrtgre

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What program hides in a computer and allows someone from a remote location take full control of the computer?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What is a malicious program allows someone to take control of a computer?

Rootkit


What is the program that hides in a computer and allows someone from a remote location to take full control of the computer?

Its called a R.A.T which is Remote Access Tool. These programs are encrypted allowing them to pass unrecognized through Anti Virus software. AV companies are constantly updating their software as hackers find new and better ways to stay undetected whilst in your computer. These programs are illegal if used to enter someone's computer without their knowledge or permisson.


What do you call someone who creates a program to break into someone else's computer?

hacker


Is there anyway to tell if someone has logged into your computer from a remote location?

By placing a good firewall installed, you are able to know when someone connects from a a remote location.


How does someone access the school computer control panal?

your momma can do it for you


Can someone help you with your project about the computer?

sure, someone can give me advice on anti virus program to use


Where can someone get the computer program FscanF?

Stack Over Flow and Daily Free Code are both places where an individual can not only get the computer program F Scan F but also gives information about the program.


WHAT is used to control your computer by someone else?

You can download Team Viewer


What does a remote control computer do?

Do you mean remote control OF a computer? That means that a program has been installed on a computer (computer A) that lets someone on another computer somewhere else (Computer B) control the computer instead of the owner/user. The remote person on Computer B can move the mouse, click links, open files, etc as if they were physically sitting in front of Computer A themselves. Computer technicians, working with customers over the phone, will sometimes use this as a tool the help fix the computer, especially with clients that don't understand computers well enough to follow the techs instructions. Hackers can use this to steal info on a computer from a distance. If you meant what you said... remote control computer... I don't really know without a better description. Maybe it is the computer doing the controlling?


How can a consumer credit management program help you?

There are many ways that a consumer credit management program might help someone. A computer credit management program might help someone by allowing them to organize their finances.


Program for insertion and deletion operations in AVL tree?

Here is a high-level overview of insertion and deletion operations in an AVL tree: Insertion: Perform a standard BST insertion. Update the height of each node as the new node is inserted. Perform rotations if the balance factor of any node becomes greater than 1 or less than -1. Deletion: Perform a standard BST deletion. Update the height of each node as the node is deleted. Perform rotations if the balance factor of any node becomes greater than 1 or less than -1 to rebalance the tree.


What do you call someone that makes computer games that starts with a p?

A Programmer makes computer games. The Programmer writes, tests and debugs the detailed instructions in the computer program.