Onel de Guzman's rejected thesis proposal at AMA Computer College
(Note: The following is a copy of Onel de Guzman's rejected thesis proposal, which has been linked to the "ILOVEYOU" virus. Here, de Guzman proposes that a Trojan Horse be used to steal passwords from other users to get free Internet access.)
AMA COMPUTER COLLEGE COLLEGE OF COMPUTER STUDIES
THESIS SUBJECT PROPOSAL
NAME OF THE STUDENT: Onel A. De Guzman
PROPOSED THESIS TITLE: Email Password Sender Trojan
POSSIBLE AREA OF INVESTIGATION: Software Product
Trojan horse is a legitimate program that has been altered by the placement of unauthorized instructions within it. These instructions perform functions unknown to (and probably unwanted by) the user. They are not virus and do not replicate like virus. They are complete application, are not attached themselves. This is the main idea and function of the Trojan horse program.
Email Password Sender Trojan is a small Trojan horse, that will send on to your email somebody's Internet access passwords such as (CACHE, RAS - (Remote Access Service), WEB, and Screen Saver) passwords. All passwords that will save by the infected user will send it, to the configurable email in the server side.
Email Password Sender Trojan has two parts, a client and a server part. Client part, this a configuration of a server part, by doing this you can configure Destination Email Address, Server Mail or the Host address where it is sent, also you can configure by scheduling of sending of what day will send to your email. Server part is the Trojan itself and has an extension *.exe you can send it to your friend or to your chatter, if the user run the program, the program run in background and visible even in the Task List (Ctrl+Alt+Del) to become unknown to the infected user after that in 1 minute this Trojan program cached all types of saved passwords and send it directly to the configurable email address using SMTP internet mail protocol. Also if you have an access to your friend computer you can run this program to infect him to get his/her Internet passwords. Also this Trojan is useable in retrieving of lose passwords, this program has the ability to cached all your save passwords in your Windows directly send the summary to your email.
Cleaner is also included in this software package so that the user can immediately remove or clean the Trojan if he/she has accidentally execute the server.
REASON FOR STUDY:
The researcher decided to develop this program because the researcher believes that it will be helpful to a lot of people specially Internet users to get Windows passwords such as Internet Accounts to spend more time on Internet without paying.
IMPORTANCE OF THE STUDY:
The importance of the study is to help other people most especially Windows users. We all know that when we connect to the Internet we spend more time for surfing and reading email only, so when we are spending time we spend lots of money to pay the accounts for only using a couple of hours. So this program is the main solution, use it to steal and retrieve Internet accounts of the victim's computer.
METHODOLOGY TO BE USED:
In making this study, the research can gather data by reading computer books, surfing the Internets what's new about developing Email, stealing passwords and news about Trojans. Survey and questionnaires will be conducted to support the development of the software.
The technique that will be used by researcher for the computer implementation of the software is prototyping.
The software will take the form of paper prototype that implement some subset functions required of the desire features of the software because the researcher will start to scratch to develop software.
The language that is being used is Microsoft Visual C++ version 6.0 under Windows environment wherein some functions of this software is focusing Windows passwords and developing Email. This compiler is direct use API (Application Programming Interface) so it is easy to use and more comfortable to develop the software and because of compatibility of the software to run in Windows machine the researcher decided to use this compiler. And also this compiler is object-oriented language so its easy manipulate data.
For the final version of the program, the final testing of the study will conducts to some computer Internet addicts and non addicts, hackers, anti-hackers, high schools and college students, professional and non-professional will be asked to test the program's capabilities and their feedback through answering survey forms after testing the program.
The researcher will benefit all Windows Internet users from beginners to professional because this software is free to all. The main idea of this software is to cached and retrieved all lose passwords that users can enjoy it.
TITLE AND AUTHOR OF PREVIOUS STUDIES:
SIMILARITIES AND DIFFERENCES WITH OTHER RELATED STUDIES:
Trojan System: File System Guard, Ria Ann D. Ero, AMA Computer College Makati, August 1998
The software is all about security and protections against unauthorized program running in hidden mode and unknown to user. This system security is run in TSR mode in DOS environment, all programs running are check by this software to identify either it is a Trojan or not. This system security and protection is not accurate in checking and hunting of Trojans because many of Trojans is run in Windows environment.
The similarities of the previous study to the present study is that, both studies deal and focusing about Trojans.
The previous study is all about security and protections against unauthorized program running, while the present study is all about a system that can break security of a system and steal user's information.
ALTERMAIL, Conrad M. Pinili, AMA Computer College Makati, April 1999
AlterMail is a software application about email client. Using this utility software you can send compose and get mail in a single utility software like many popular email clients such as Outlook and Eudora Mail. This software is made in Visual Basic 5.0 so this software is GUI base and support 16 and 32 bit environment of Windows.
The similarity of the previous study to the present study is that, both Software has sending of email, and both software is run in Windows base environment under 16 and 32 bit.
The difference of the previous study to the present is that the previous study deals with email client by compose and reading email while the present study deals only in sending body of email. Internet Utilities Online, Licolas T. Lim, AMA Computer College Makati, April 1999
Internet Utilities Online, this software is all about tools in Internet with a package of Email, FTP, Search Engine, and Time Web Manager. This package is more useful than the other Internet utilities because this software is complete package and lots of features such as sending, composing and reading of email, online time monitoring, Web search and uploading and downloading of files on the Net using FTP.
The similarity of the previous study to the present study is that, both studies deal on Internet and both had a function of sending of email.
The difference of the previous study to the present study is that, the previous study deals not only in Email but also have a package of FTP, Search Engine, and Time Web Manager, while the present study deals only in sending of body of email.