Three Types of Virus
Worms - copy themsevlve, wriggle through security holes in network
Trojan Horse - poses as a safe program (key logger)
Virus - replicate themsevlves, contact - USB, internet, downloads, emails, msn
Virus Actions
REpliation
Camouflage
Watching
Delivery
Detection Techniques
Check Sum
Virus Signature
heuristic detection
memory resident monitoring
Friday, 27 November 2009
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment