Solved

the algorithm(s)of detecting spyware, adware, keyloggers, trojans etc

Posted on 2006-11-06
6
297 Views
Last Modified: 2010-04-11
Are there any tutorials on the algorithm(s) of detecting spyware, adwae, keylogger, trojans etc.... All my searches have just produced software programs that can detect it. I'm more intersted in how it detects it? I'm not exactly sure where to get started... Any tutorials or books would be great.
0
Comment
Question by:dotnet22
  • 3
  • 3
6 Comments
 
LVL 18

Accepted Solution

by:
PowerIT earned 500 total points
ID: 17881834
What will you be using it for? To circumvent detection???

J.
0
 

Author Comment

by:dotnet22
ID: 17881980
I wanted to build a spyware detecter...
0
 

Author Comment

by:dotnet22
ID: 17882008
Guys never mind the question. I can see where PowerIT is leading too. I'm kind of insulted to be honest. You shouldn't imply these types of things.
0
Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

 
LVL 18

Expert Comment

by:PowerIT
ID: 17882659
You shouldn't be instulted. It's just one of the rules here at EE. Do no harm and don't help the bad guys. So we have to ask.
And I still am glad to help. I know I have such a reference on viruses at home. I'll have a look and see if it also references other malware.

J.
0
 
LVL 18

Expert Comment

by:PowerIT
ID: 17883654
OK, the book I was referring to is: The Art of Computer Virus Research and Defense, by Peter Szor (Addison-Wesley Professional, 744 pag).
It's very recent (2005) and currently incredibly cheap on Amazon
Another one I recommend, although a bit older (2003): Malware: Fighting Malicious Code by Ed Skoudis, Lenny Zeltser (Prentice Hall, 432 pag).

J.
0
 

Author Comment

by:dotnet22
ID: 17883766
Thanks. That's all I was looking for.
0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

February 24, 2017 — On February 23, Travis Ormandy, a vulnerability researcher at Google, reported on Twitter (https://twitter.com/taviso/status/834900838837411840) that massive stores of data have been leaked by CloudFlare, a company that provide…
This article describes my battle tested process for setting up delegation. I use this process anywhere that I need to setup delegation. In the article I will show how it applies to Active Directory
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

829 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question