In some systems, for a particular purpose, the program is often required to hide the background monitoring system, the Trojan control program, source copy, etc. in the DCS (distributing control system) to reduce the risk of discovery, interception, and disassembly. This functional module requires that the program does not appear on the desktop during operation, nor is it allowed by the operator from the task manager list.
Full text reading:
Implement "Trojan" stealth operation procedure with VB