Distributed Computing with a Trojan Horse

In this paper we describe constructing a trojan horse application for the purpose of distributed computing on the Internet. The mechanisms used by the trojan horse are discussed in detail. We also detail the procedure by which a user can be tricked to install the trojan using a known Microsoft Outlook Express vulnerability. The gains and risks of constructing a distributed computing network using this kind of trojan are considered briefly.