SysChat is a free online computer support community. Ask questions, share resources, contribute knowledge and discuss technology. Join our growing community to access all features. Register Now!

SysChat » Tutorials » Security » Effects and Removal of Back Orifice


Guides and tutorials on computer security, antivirus, antispyware, malware, parental control, and privacy protection

LinkBack Tutorial Tools
Effects and Removal of Back Orifice

Effects and Removal of Back Orifice

Published by DanielGray

Default Effects and Removal of Back Orifice

A Back Orifice virus was created by CDC (Cult of the Dead Cow). It permits a remote system to manipulate the infected Windows computer using the GUI or console application. The remote user can control a system via direct connection or LAN. Due to the capability of the Back Orifice, it was considered as hazardous program able to contaminate Windows Operating Systems.

Back Orifice Penetrating Methods

This application can be attached to any program, files or as a module of installation software. It could be executed by specific software of by itself, and it installs the secondary program, which might be run by a particular application. This will make the computer vulnerable because Back Orifice opens a door which can be utilized by the hacker to control the computer when connected to the web. Its operation is highly undetected.

How to Avoid Back Orifice Infection

Expert suggests that in able to avoid Back Orifice, the system should be regularly updated. Install from known source the necessary system and utility updates. The use of legitimate anti spyware application is recommended.

Back Orifice Infection Symptoms

When the computer closes or opens a program all on its own, it might be affected by Back Orifice. The hacker can reboot the system, lock the remote computer, execute any program, and can copy files. The hacker can also display messages, manage the mouse control, keyboard inputs, or manipulating the ROM drive.

Back Orifice Effects

The effects of Back Orifice on the infected system may be catastrophic since the hacker has the capacity to do anything with the remote system. This could cause a serious problem to the user, loss of data, which could damage the entire files and the system as well. Since the Back Orifice uses the TCP/IP network, the hacker is capable to manage the computer anywhere in the world and can ruin the entire operating system.

Easy Back Orifice Removal

To delete the Back Orifice, run the BoDetect program. Install the application and scan the system for Back Orifice’s file components. Delete all instances and files detected by the program. The application will erase the exe files of the malware.

How to Remove Back Orifice

To manually remove the Back Orifice, back up the registry before attempting the removal. Locate the following registry key using the Start Menu > Run > regedit >,
• HKEY_LOCAL_MACHINE\SOFTWARE\ Microsoft\ Windows\ CurrentVersion\ RunServices
• Erase the value (.exe) and highlight the entry and press delete.
• Close the regedit.
Using the Start Menu > Run > type Command > locate the following the delete: C:\Windows \ System \ exe~1


Tutorial Tools

Similar Threads
Tutorial Tutorial Starter Category Comments Last Post
VB EER Trojan info and removal DanielGray Security 0 06-16-2009 05:42 AM
Windows XP and Vista Threat: WORM_RBOT.AVL - Effects and Removal DanielGray Security 0 06-11-2009 09:27 PM
W32.Aspam.Trojan.B: Description, Effects, and Removal. DanielGray Security 0 06-06-2009 01:47 AM

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is on
Smilies are on
[IMG] code is on
HTML code is Off
Trackbacks are Off
Pingbacks are Off
Refbacks are on

» Ads

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54