“Techniques a worm might use to be harder to locate” is a look at how worms may evolve to be harder to locate on a infected computer. It begins very simple to build up to some ideas that are quite complex. Includes example source code written in Perl.
You can download it from the following link: https://packetstormsecurity.com/files/download/25855/200201p.txt
Source: https://packetstormsecurity.com/files/25855/200201p.txt.html

