Browse Wiki & Semantic Web

Jump to: navigation, search
Http://dbpedia.org/resource/Winzapper
  This page has no properties.
hide properties that link here 
  No properties link to this page.
 
http://dbpedia.org/resource/Winzapper
http://dbpedia.org/ontology/abstract Winzapper is a freeware utility / hacking Winzapper is a freeware utility / hacking tool used to delete events from the Microsoft Windows NT 4.0 and Windows 2000 Security Log. It was developed by Arne Vidstrom as a proof-of-concept tool, demonstrating that once the Administrator account has been compromised, event logs are no longer reliable. According to Hacking Exposed: Windows Server 2003, Winzapper works with Windows NT/2000/2003. Prior to Winzapper's creation, Administrators already had the ability to clear the Security log either through the Event Viewer or through third-party tools such as . However, Windows lacked any built-in method of selectively deleting events from the Security Log. An unexpected clearing of the log would likely be a red flag to system administrators that an intrusion had occurred. Winzapper would allow a hacker to hide the intrusion by deleting only those log events relevant to the attack. Winzapper, as publicly released, lacked the ability to be run remotely without the use of a tool such as Terminal Services. However, according to Arne Vidstrom, it could easily be modified for remote operation. There is also an unrelated trojan horse by the same name.n unrelated trojan horse by the same name.
http://dbpedia.org/ontology/wikiPageID 13410249
http://dbpedia.org/ontology/wikiPageLength 3866
http://dbpedia.org/ontology/wikiPageRevisionID 1060218461
http://dbpedia.org/ontology/wikiPageWikiLink http://dbpedia.org/resource/Windows_2000 + , http://dbpedia.org/resource/Booting + , http://dbpedia.org/resource/Freeware + , http://dbpedia.org/resource/Event_Viewer + , http://dbpedia.org/resource/Windows_NT_4.0 + , http://dbpedia.org/resource/Hacking_tool + , http://dbpedia.org/resource/Undelete + , http://dbpedia.org/resource/Terminal_Services + , http://dbpedia.org/resource/Trojan_horse_%28computing%29 + , http://dbpedia.org/resource/Security_Log + , http://dbpedia.org/resource/Clearlogs + , http://dbpedia.org/resource/Category:Computer_security_software + , http://dbpedia.org/resource/Microsoft +
http://dbpedia.org/property/wikiPageUsesTemplate http://dbpedia.org/resource/Template:Reflist +
http://purl.org/dc/terms/subject http://dbpedia.org/resource/Category:Computer_security_software +
http://purl.org/linguistics/gold/hypernym http://dbpedia.org/resource// +
http://www.w3.org/ns/prov#wasDerivedFrom http://en.wikipedia.org/wiki/Winzapper?oldid=1060218461&ns=0 +
http://xmlns.com/foaf/0.1/isPrimaryTopicOf http://en.wikipedia.org/wiki/Winzapper +
owl:sameAs https://global.dbpedia.org/id/4x6qF + , http://www.wikidata.org/entity/Q8026654 + , http://dbpedia.org/resource/Winzapper + , http://rdf.freebase.com/ns/m.03c4fk_ +
rdfs:comment Winzapper is a freeware utility / hacking Winzapper is a freeware utility / hacking tool used to delete events from the Microsoft Windows NT 4.0 and Windows 2000 Security Log. It was developed by Arne Vidstrom as a proof-of-concept tool, demonstrating that once the Administrator account has been compromised, event logs are no longer reliable. According to Hacking Exposed: Windows Server 2003, Winzapper works with Windows NT/2000/2003. There is also an unrelated trojan horse by the same name.n unrelated trojan horse by the same name.
rdfs:label Winzapper
hide properties that link here 
http://dbpedia.org/resource/Proof_of_concept + http://dbpedia.org/ontology/wikiPageWikiLink
http://en.wikipedia.org/wiki/Winzapper + http://xmlns.com/foaf/0.1/primaryTopic
http://dbpedia.org/resource/Winzapper + owl:sameAs
 

 

Enter the name of the page to start semantic browsing from.