<< the trojan must be running on the victim pc in order to accept commands!!!! the only way a program can be run is if the user executes it!!! there is no way to execute a file on somebody elses computer! >>
Wrong. If the hacker accesses your share, he just drops in the trojan. The trojan runs and makes all the changes necessary to give him control over your system, INCLUDING executing programs.
It makes registry changes, system.ini changes, win.ini changes and replaces whatever files are necessary to give remote control to the hacker.
If the user actually had to do ANYTHING, hackers would not be nearly as successful as they are.
You remind me of my insurance agent who thought he knew what he was talking about. Until his system completely crashed and I found seven different trojans on it.
He never installed a damned thing himself. But he did leave his port 139 wide open with file and print sharing bound to TCP/IP.
You just keep basking in that ignorance and sooner or later, you'll be the next victim.
Russ, NCNE
