Hey...
I think you confuse this a little with using exploits or maybe telnet.
Most of the trojans (well,Remote Administrative Tools or RAT to be correct) are using a graphical user interface. There are 2 main parts: server and client. The server is the part with which the target system have to be infected, then you can access the box by using the client part on your system. Simply start the client and you´ll know what I mean, but NEVER run the server part.....
