Search: Home Bugtraq Vulnerabilities Mailing Lists Security Jobs Tools
Infocus: Virus (Page 1 of 7)   1 2 3 4 5 6  Next >
Fighting EPO Viruses
This article studies complex Entry Point Obscuring (EPO) viruses, by looking at the detection and removal of the difficult Win32.CTX.Phage virus.
By: Piotr Bania 2005-06-29
http://www.securityfocus.com/infocus/1841

The True Computer Parasite
This article examines the evolution of malware, highlighting developments in replication techniques as well as significant changes in the nature of payload activities -- which now often generate profit for the malware creators.
By: Dr. Steven Furnell, Dr. Jeremy Ward 2005-06-01
http://www.securityfocus.com/infocus/1838

Detecting Complex Viruses
The purpose of this paper is to examine the difficulties of detecting complex viruses, including polymorphic, metamorphic and entry-point obscuring viruses. Whether or not an anti-virus (AV) technology can detect these viruses can be a useful metric to consider when evaluating AV products.
By: Peter Ferrie, Frederic Perriot 2004-12-06
http://www.securityfocus.com/infocus/1813

Lessons Learned from Virus Infections
This article discusses how a virus outbreak will produce a few unique opportunities to examine the health of an organization's network -- and learn ways to further harden the network from future automated attacks.
By: Jason Gordon 2004-10-04
http://www.securityfocus.com/infocus/1804

Detecting Worms and Abnormal Activities with NetFlow, Part 2
This paper discusses the use of NetFlow, a traffic profile monitoring technology available on many routers, for use in the early detection of worms, spammers, and other abnormal network activity in large enterprise networks and service providers. Part 2 of 2.
By: Yiming Gong 2004-09-23
http://www.securityfocus.com/infocus/1802

Detecting Worms and Abnormal Activities with NetFlow, Part 1
This paper discusses the use of NetFlow, a traffic profile monitoring technology available on many routers, for use in the early detection of worms, spammers, and other abnormal network activity in large enterprise networks and service providers.
By: Yiming Gong 2004-08-16
http://www.securityfocus.com/infocus/1796

Malware Analysis for Administrators
The purpose of this article is to help administrators and power users use behavioral analysis to determine if a binary is harmful malware, by analyzing it in a lab environment without the use of anti-virus software, debuggers, or code disassembly.
By: S. G. Masood 2004-05-20
http://www.securityfocus.com/infocus/1780

Antivirus Concerns in XP and .NET Environments
This article will discuss new antivirus concerns within Microsoft's .NET framework and Windows XP applications.
By: Roger A. Grimes 2003-07-07
http://www.securityfocus.com/infocus/1707

Effects of Worms on Internet Routing Stability
This article discusses the impact of worms on Internet endpoints and infrastructure, as well as their impact on global routing instability throughout the Internet.
By: Ido Dubrawsky 2003-06-11
http://www.securityfocus.com/infocus/1702

Malware Myths and Misinformation Part 2
This article is the second of a three-part series looking at some of the myths and misconceptions that undermine anti-virus protection.
By: David Harley 2003-05-28
http://www.securityfocus.com/infocus/1698

Virus (Page 1 of 7)   1 2 3 4 5 6  Next >







 

Privacy Statement
Copyright 2005, SecurityFocus