Solved

the algorithm(s)of detecting spyware, adware, keyloggers, trojans etc

Posted on 2006-11-06
6
296 Views
Last Modified: 2010-04-11
Are there any tutorials on the algorithm(s) of detecting spyware, adwae, keylogger, trojans etc.... All my searches have just produced software programs that can detect it. I'm more intersted in how it detects it? I'm not exactly sure where to get started... Any tutorials or books would be great.
0
Comment
Question by:dotnet22
  • 3
  • 3
6 Comments
 
LVL 18

Accepted Solution

by:
PowerIT earned 500 total points
ID: 17881834
What will you be using it for? To circumvent detection???

J.
0
 

Author Comment

by:dotnet22
ID: 17881980
I wanted to build a spyware detecter...
0
 

Author Comment

by:dotnet22
ID: 17882008
Guys never mind the question. I can see where PowerIT is leading too. I'm kind of insulted to be honest. You shouldn't imply these types of things.
0
Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

 
LVL 18

Expert Comment

by:PowerIT
ID: 17882659
You shouldn't be instulted. It's just one of the rules here at EE. Do no harm and don't help the bad guys. So we have to ask.
And I still am glad to help. I know I have such a reference on viruses at home. I'll have a look and see if it also references other malware.

J.
0
 
LVL 18

Expert Comment

by:PowerIT
ID: 17883654
OK, the book I was referring to is: The Art of Computer Virus Research and Defense, by Peter Szor (Addison-Wesley Professional, 744 pag).
It's very recent (2005) and currently incredibly cheap on Amazon
Another one I recommend, although a bit older (2003): Malware: Fighting Malicious Code by Ed Skoudis, Lenny Zeltser (Prentice Hall, 432 pag).

J.
0
 

Author Comment

by:dotnet22
ID: 17883766
Thanks. That's all I was looking for.
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

As technology users and professionals, we’re always learning. Our universal interest in advancing our knowledge of the trade is unmatched by most industries. It’s a curiosity that makes sense, given the climate of change. Within that, there lies a…
How do we balance the user experience (UX) with reasonable security measures? It can be done, if you keep these fundamentals in mind.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

823 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question