When.com Web Search

  1. Ads

    related to: practical malware analysis book download free pdf

Search results

  1. Results From The WOW.Com Content Network
  2. Malware analysis - Wikipedia

    en.wikipedia.org/wiki/Malware_Analysis

    Malware analysis is the study or process of determining the functionality, origin and potential impact of a given malware sample such as a virus, worm, trojan horse, rootkit, or backdoor. [1] Malware or malicious software is any computer software intended to harm the host operating system or to steal sensitive data from users, organizations or ...

  3. The Cuckoo's Egg (book) - Wikipedia

    en.wikipedia.org/wiki/The_Cuckoo's_Egg_(book)

    The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage is a 1989 book written by Clifford Stoll. It is his first-person account of the hunt for a computer hacker who broke into a computer at Lawrence Berkeley National Laboratory (LBNL). Stoll's use of the term extended the metaphor Cuckoo's egg from brood parasitism in birds to ...

  4. The Rootkit Arsenal - Wikipedia

    en.wikipedia.org/wiki/The_Rootkit_Arsenal

    The book also provides many source code examples on rootkit development and how to properly use it. It is required and recommended to have a fair understanding of computer programming and operating systems in order to fully comprehend the contents of the book, as the back cover states it is an advanced book on its topic.

  5. Malware research - Wikipedia

    en.wikipedia.org/wiki/Malware_research

    Research in combining static and dynamic malware analysis techniques is also currently being conducted in an effort to minimize the shortcomings of both. Studies by researchers such as Islam et al. [13] are working to integrate static and dynamic techniques in order to better analyze and classify malware and malware variants.

  6. Interactive Disassembler - Wikipedia

    en.wikipedia.org/wiki/Interactive_Disassembler

    IDA is used widely in software reverse engineering, including for malware analysis [6] [7] and software vulnerability research. [8] [9] IDA's decompiler is one of the most popular and widely used decompilation frameworks, [10] [11] [12] and IDA has been called the "de-facto industry standard" for program disassembly and static binary analysis ...

  7. Timeline of computer viruses and worms - Wikipedia

    en.wikipedia.org/wiki/Timeline_of_computer...

    CrySyS stated in their report that "sKyWIper is certainly the most sophisticated malware we encountered during our practice; arguably, it is the most complex malware ever found". [77] August 16: Shamoon is a computer virus designed to target computers running Microsoft Windows in the energy sector. Symantec, Kaspersky Lab, and Seculert ...

  8. Xplico - Wikipedia

    en.wikipedia.org/wiki/Xplico

    Xplico is a network forensics analysis tool (NFAT), which is a software that reconstructs the contents of acquisitions performed with a packet sniffer (e.g. Wireshark, tcpdump, Netsniff-ng).

  9. Computer forensics - Wikipedia

    en.wikipedia.org/wiki/Computer_forensics

    The scope of a forensic analysis can vary from simple information retrieval to reconstructing a series of events. In a 2002 book, Computer Forensics , authors Kruse and Heiser define computer forensics as involving "the preservation, identification, extraction, documentation and interpretation of computer data". [ 5 ]