Articles Blog | G5 Cyber Security

Research – 200201p.txt

“Techniques a worm might use to be harder to locate” is a look at how worms may evolve to be harder to locate on a infected computer. It begins very simple to build up to some ideas that are quite complex. Includes example source code written in Perl.

 

You can download it from the following link: https://packetstormsecurity.com/files/download/25855/200201p.txt

Source: https://packetstormsecurity.com/files/25855/200201p.txt.html

Exit mobile version