Best State of Art IT Security Solutions
The best Innovative and powerful IT Security products

Encyclopedia / Encyclopedia Part 5 /

Attacks on the Macros and ActiveX explained? 

There are small pieces of codes that may be activated within a document and this is designed to make operations easier for the users. These essential file codes are known to be as “macros”. These codes are modifiable in nature in which it may be programmed in such a way that it can carry out certain operations including concealing and showing the tabs in Microsoft Office’s Excel application once a checkbox has been ticked. Aside from the role of macros in Excel, it also has defined functions in Microsoft Word wherein a database may be scanned and all the pieces of information will be included in the table.

Macros may also be utilized by the individuals

Who are not knowledgeable about programming. Recording particular keystrokes is possible when the macros are used and these codes are activated whenever there is a need to do the same operations for a couple of times. This function makes a certain task less difficult for the users.
Attacks, while making use of macros, appear to be the most effective medium for vicious criminals who desire to use various devices in their attempt in accessing the systems of particular organization within a certain period of time. Assaults may be performed with the utilization of scripting language like the Visual Basic for Applications or VBA. And, the most important step in order to successfully carry out the attack is the incorporation of malicious macros into the documents created with the use of Microsoft Office. The most commonly used MS Office application in this form of assault is the Microsoft Word. However, other applications appear to be used as well and these are the Excel and PowerPoint.
ActiveX, on the other hand, is a kind of tool that permits experts to establish code-reusing-applications as well as their components. This is typically found in the pieces of software that are used in a person’s daily life like MS Office, Microsoft Visual Studio, Microsoft Media Player, and the web browser Internet Explorer.
Attackers who make use of the ActiveX have a specific common goal and this is to access the computer system of their victim. One of the forms of attacks used by the vicious criminals is the insertion of an altered ActiveX control into web pages. Their main goal is to lure the native users into visiting websites or be directed towards them and execute the control.
Vulnerability Scanner - Vulnerability Management 

➤ Related pages
Attacks on Macros and ActiveX?
Crack WiFi Passwords
Hacking WiFi password
Hacking WiFi Passwords
What is a Cracker?
What is a Null Session?
What is a Password Replay Attack?
What is a password?
What is Cyberwarfare?
What is Linux?
What is MD5 Encryption?
What is Novell NetWare?
What is Phrack?
What is Social Engineering?
Wi-Fi Auditor the Portable Penetrator
WiFi Decoder Recover
WiFi Password Cracker soft
WPA hacking software

Powerful UTM Firewall, Vulnerability Scanner, WiFi Penetration Testing software

SecPoint is specialized to deliver the best IT security solutions and products.

Compatible with Product
Securely protected by SecPoint
Customer reference King Customer reference New York Customer reference ROC Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef Customer reference King Customer reference New York Customer reference Roc Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef