Kurapica Posted March 21, 2010 Posted March 21, 2010 An overview with some examples, written by ir3t from Black Storm This paper was written within the scope of the author´s own learning process, during her studies of computer science and on the basis of her own malware analyses.It was published in order to offer an introduction to several file infection techniques used by viruses, showing examples and explaining appropriate countermeasures. It is aimed at everyone who is interested in the topic of malware and does not require previous knowledge, though a basic understanding of the PE file format, virtual memory management and the Windows OS in general is advantageous. Who said girls can't code !!? />http://portal.b-at-s.info/download.php?view.454
xsp!d3r Posted April 23, 2010 Posted April 23, 2010 no one can say girls can't code and the prove is lena ^^ and btw nice article
JMC31337 Posted May 13, 2010 Posted May 13, 2010 Not bad, not bad at all. Very thourough. Girls are sexier if they can code
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now