By David Ferbrache BSc(Hons) (auth.)

The 1980's observed the appearance of frequent (and most likely destructive) malicious program an infection of either pc and mainframe structures. the pc safety box has been relatively gradual to react to this rising scenario. it's only over the past years major physique of data at the operation, most likely evolution and prevention of laptop viruses has built. A Pathology of computing device Viruses offers an in depth evaluate of the historical past of the pc virus and an in-depth technical overview of the rules of trojan horse and malicious program operation less than DOS, Mac, UNIX and DEC working structures. David Ferbrache considers the prospective extension of the danger to the mainframe structures setting and indicates how the risk may be successfully combatted utilizing an antiviral administration plan. the writer addresses the most recent advancements in "stealth" virus operations, in particular the craze for virus authors to undertake huge camouflage and concealment suggestions, which permit viruses to avert either present anti-viral software program and to prevent detection via direct remark of computer behaviour. A Pathology of computing device Viruses addresses a different want - that of the pc professional who wishes a resource reference paintings detailing all features of the pc virus threat.

Show description

Read or Download A Pathology of Computer Viruses PDF

Best security & encryption books

Internet and Wireless Security

Many businesses are remodeling their companies during the improvement of data and communications applied sciences. the protection of this e-commerce is now a key enabler for companies and this e-book offers an summary of present and destiny infrastructures for e-business together with XML safety mechanisms and subsequent new release Public Key Infrastructures (PKI), in addition to electronic archiving and instant defense that is set to be an incredible development sector with the whole rollout of 3G cellular networks.

CompTIA Security+ SYO-201 Cert Guide

CompTIA® protection+ SY0-201 Cert consultant   David L. Prowse   DVD positive factors whole perform examination   grasp each subject on CompTIA’s new safety+ SY0-201 examination. examine your wisdom and concentration your studying. Get the sensible place of work wisdom you would like!   Start-to-finish defense+ SY0-201 training from machine safety advisor, safeguard+ coach, and writer David L.

PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)

The single entire consultant to designing, imposing, and helping cutting-edge certificate-based identification ideas with PKI   Layered procedure is designed to aid readers with extensively diversified backgrounds fast study what they should be aware of Covers the full PKI venture lifecycle, making complicated PKI architectures uncomplicated to appreciate and install Brings jointly idea and perform, together with on-the-ground implementers' wisdom, insights, top practices, layout offerings, and troubleshooting info    PKI exposed brings jointly all of the suggestions IT and defense pros have to practice PKI in any setting, regardless of how complicated or subtle.

CompTIA Cybersecurity Analyst (CSA+) Study Guide: Exam CS0-001

Arrange your self for the latest CompTIA certification The CompTIA Cybersecurity Analyst+ (CSA+) examine consultant offers a hundred% insurance of all examination pursuits for the recent CSA+ certification. The CSA+ certification validates a candidate's talents to configure and use possibility detection instruments, practice facts research, establish vulnerabilities with a target of securing and keeping firms platforms.

Additional resources for A Pathology of Computer Viruses

Example text

The user mailing the virus had not considered his actions, which led to the global distribution of the virus binary. 1t does, however, indicate the twoedged sword that global warning mechanisms may provide. 2 May-September On 4 May the sentencing of Robert Morris was carried out in Syracuse, New York. Morris was sentenced to three years' prabation, a fine of $10 000 and 400 hours of community service. y after his sentencing but gave no comment. Strang condemnation of the failure to sentence Morris to imprisonment was expressed by Representative Wally Herger, author of legislation to specifically outlaw viruses.

Indeed there are a number of proofs that no possible set of criteria or characteristics can be used to identify a virus absolutely. 3 Detection of Viruses Cohen provides the following basic proof of the undecidability of whether an object is a virus. He proposed the construction of a function "is_<1-virus". This function returns "true" if a program is a virus, otherwise it returns "false". By including this function in the virus propagation code itself, we can invoke a contradiction which can be used to prove that this function cannot be written.

The initial advice was to avoid infection by utilising on 1200 or lower baud rate modems. A parody of this message was se nt to the USENET security mailing list in January 1989, and advised: Date: 11-31-88 (24:60) Number: 32769 To: ALL Refer#: NONE Read: (N/A) From: ROBERT MORRIS 111 Subj: VIRUS ALERT Status: PUBUC MESSAGE Waming: Therets a new virus on the loose thatts worse than anything Itve seen before! It gets in through the power Iinet riding on the powerline 60 Hz subcarrier. It works by changing the serial port pinouts, and by reversing the direction onets disks spin.

Download PDF sample

Rated 4.26 of 5 – based on 6 votes