?
Solved

the algorithm(s)of detecting spyware, adware, keyloggers, trojans etc

Posted on 2006-11-06
6
Medium Priority
?
308 Views
Last Modified: 2010-04-11
Are there any tutorials on the algorithm(s) of detecting spyware, adwae, keylogger, trojans etc.... All my searches have just produced software programs that can detect it. I'm more intersted in how it detects it? I'm not exactly sure where to get started... Any tutorials or books would be great.
0
Comment
Question by:dotnet22
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
6 Comments
 
LVL 18

Accepted Solution

by:
PowerIT earned 1000 total points
ID: 17881834
What will you be using it for? To circumvent detection???

J.
0
 

Author Comment

by:dotnet22
ID: 17881980
I wanted to build a spyware detecter...
0
 

Author Comment

by:dotnet22
ID: 17882008
Guys never mind the question. I can see where PowerIT is leading too. I'm kind of insulted to be honest. You shouldn't imply these types of things.
0
Ransomware Attacks Keeping You Up at Night?

Will your organization be ransomware's next victim?  The good news is that these attacks are predicable and therefore preventable. Learn more about how you can  stop a ransomware attacks before encryption takes place with our Ransomware Prevention Kit!

 
LVL 18

Expert Comment

by:PowerIT
ID: 17882659
You shouldn't be instulted. It's just one of the rules here at EE. Do no harm and don't help the bad guys. So we have to ask.
And I still am glad to help. I know I have such a reference on viruses at home. I'll have a look and see if it also references other malware.

J.
0
 
LVL 18

Expert Comment

by:PowerIT
ID: 17883654
OK, the book I was referring to is: The Art of Computer Virus Research and Defense, by Peter Szor (Addison-Wesley Professional, 744 pag).
It's very recent (2005) and currently incredibly cheap on Amazon
Another one I recommend, although a bit older (2003): Malware: Fighting Malicious Code by Ed Skoudis, Lenny Zeltser (Prentice Hall, 432 pag).

J.
0
 

Author Comment

by:dotnet22
ID: 17883766
Thanks. That's all I was looking for.
0

Featured Post

[Webinar] Lessons on Recovering from Petya

Skyport is working hard to help customers recover from recent attacks, like the Petya worm. This work has brought to light some important lessons. New malware attacks like this can take down your entire environment. Learn from others mistakes on how to prevent Petya like worms.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article is written by John Gates, CISSP. Gates, the SNUG President-Elect, currently holds the position of Manager of Information Systems at Lake Park High School in Roselle, Illinois.
What's worse than having your data encrypted by ransomware? Getting attacked by a so-called "wiper," which simply destroys the data and offers you no hope of ever seeing it again.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Suggested Courses

764 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question