Solved

the algorithm(s)of detecting spyware, adware, keyloggers, trojans etc

Posted on 2006-11-06
6
304 Views
Last Modified: 2010-04-11
Are there any tutorials on the algorithm(s) of detecting spyware, adwae, keylogger, trojans etc.... All my searches have just produced software programs that can detect it. I'm more intersted in how it detects it? I'm not exactly sure where to get started... Any tutorials or books would be great.
0
Comment
Question by:dotnet22
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
6 Comments
 
LVL 18

Accepted Solution

by:
PowerIT earned 500 total points
ID: 17881834
What will you be using it for? To circumvent detection???

J.
0
 

Author Comment

by:dotnet22
ID: 17881980
I wanted to build a spyware detecter...
0
 

Author Comment

by:dotnet22
ID: 17882008
Guys never mind the question. I can see where PowerIT is leading too. I'm kind of insulted to be honest. You shouldn't imply these types of things.
0
Get 15 Days FREE Full-Featured Trial

Benefit from a mission critical IT monitoring with Monitis Premium or get it FREE for your entry level monitoring needs.
-Over 200,000 users
-More than 300,000 websites monitored
-Used in 197 countries
-Recommended by 98% of users

 
LVL 18

Expert Comment

by:PowerIT
ID: 17882659
You shouldn't be instulted. It's just one of the rules here at EE. Do no harm and don't help the bad guys. So we have to ask.
And I still am glad to help. I know I have such a reference on viruses at home. I'll have a look and see if it also references other malware.

J.
0
 
LVL 18

Expert Comment

by:PowerIT
ID: 17883654
OK, the book I was referring to is: The Art of Computer Virus Research and Defense, by Peter Szor (Addison-Wesley Professional, 744 pag).
It's very recent (2005) and currently incredibly cheap on Amazon
Another one I recommend, although a bit older (2003): Malware: Fighting Malicious Code by Ed Skoudis, Lenny Zeltser (Prentice Hall, 432 pag).

J.
0
 

Author Comment

by:dotnet22
ID: 17883766
Thanks. That's all I was looking for.
0

Featured Post

Free Tool: Subnet Calculator

The subnet calculator helps you design networks by taking an IP address and network mask and returning information such as network, broadcast address, and host range.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many of you may be aware of the recent Google Docs scam emails that have been floating around coming from various people that you know. Here's a guide on identifying How To Identify the Scam Email You will see an email from someone you’ve had co…
Liquid Web and Plesk discuss how to simplify server management with a single tool  in their webinar.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
Suggested Courses

691 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question