The prevalence of malware and other exploits through hacker attacks, often through remote-access exploits, remains a significant threat to computers and network systems that are vulnerable because of poor security management. These issues are discussed in the following subsections.
The "Trojan defense" has been used by guilty as well as innocent computer users to support claims of their innocence by blaming the presence of illegal activities on their computers on remote attackers. While this is plausible, there seems to be a reversal of the onus of proving innocence, with the defendant instead of the prosecutor taking on the role. The big bugbear in all digital forensic examinations is linking the suspect to incriminating events. It would be fairer, but obviously too time-consuming on occasion, for the practitioner to clarify the possibility or likelihood of a remote-access exploit.
Windows operating systems permit remote access for legitimate...