Kurapica Posted March 21, 2010 Share Posted March 21, 2010 An overview with some examples, written by ir3t from Black Storm This paper was written within the scope of the author´s own learning process, during her studies of computer science and on the basis of her own malware analyses.It was published in order to offer an introduction to several file infection techniques used by viruses, showing examples and explaining appropriate countermeasures. It is aimed at everyone who is interested in the topic of malware and does not require previous knowledge, though a basic understanding of the PE file format, virtual memory management and the Windows OS in general is advantageous. Who said girls can't code !!? />http://portal.b-at-s.info/download.php?view.454 Link to comment Share on other sites More sharing options...
kimbo Posted April 8, 2010 Share Posted April 8, 2010 Kurapica, nice articles . ir3t is a girls? Link to comment Share on other sites More sharing options...
lena151 Posted April 9, 2010 Share Posted April 9, 2010 ir3t is a girls? Yep. Link to comment Share on other sites More sharing options...
xsp!d3r Posted April 23, 2010 Share Posted April 23, 2010 no one can say girls can't code and the prove is lena ^^ and btw nice article Link to comment Share on other sites More sharing options...
gurongya Posted May 12, 2010 Share Posted May 12, 2010 have a look.thank you Link to comment Share on other sites More sharing options...
JMC31337 Posted May 13, 2010 Share Posted May 13, 2010 Not bad, not bad at all. Very thourough. Girls are sexier if they can code Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now