Solved

the algorithm(s)of detecting spyware, adware, keyloggers, trojans etc

Posted on 2006-11-06
6
294 Views
Last Modified: 2010-04-11
Are there any tutorials on the algorithm(s) of detecting spyware, adwae, keylogger, trojans etc.... All my searches have just produced software programs that can detect it. I'm more intersted in how it detects it? I'm not exactly sure where to get started... Any tutorials or books would be great.
0
Comment
Question by:dotnet22
  • 3
  • 3
6 Comments
 
LVL 18

Accepted Solution

by:
PowerIT earned 500 total points
ID: 17881834
What will you be using it for? To circumvent detection???

J.
0
 

Author Comment

by:dotnet22
ID: 17881980
I wanted to build a spyware detecter...
0
 

Author Comment

by:dotnet22
ID: 17882008
Guys never mind the question. I can see where PowerIT is leading too. I'm kind of insulted to be honest. You shouldn't imply these types of things.
0
Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

 
LVL 18

Expert Comment

by:PowerIT
ID: 17882659
You shouldn't be instulted. It's just one of the rules here at EE. Do no harm and don't help the bad guys. So we have to ask.
And I still am glad to help. I know I have such a reference on viruses at home. I'll have a look and see if it also references other malware.

J.
0
 
LVL 18

Expert Comment

by:PowerIT
ID: 17883654
OK, the book I was referring to is: The Art of Computer Virus Research and Defense, by Peter Szor (Addison-Wesley Professional, 744 pag).
It's very recent (2005) and currently incredibly cheap on Amazon
Another one I recommend, although a bit older (2003): Malware: Fighting Malicious Code by Ed Skoudis, Lenny Zeltser (Prentice Hall, 432 pag).

J.
0
 

Author Comment

by:dotnet22
ID: 17883766
Thanks. That's all I was looking for.
0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Nothing in an HTTP request can be trusted, including HTTP headers and form data.  A form token is a tool that can be used to guard against request forgeries (CSRF).  This article shows an improved approach to form tokens, making it more difficult to…
Big data transfers via information superhighways require special attention and protection. Learn more about the IT-regulations of the country where your server is located. Analyze cloud providers and their encryption systems for safe data transit. S…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Concerto provides fully managed cloud services and the expertise to provide an easy and reliable route to the cloud. Our best-in-class solutions help you address the toughest IT challenges, find new efficiencies and deliver the best application expe…

932 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now