Jump to content

Featured Replies

Posted
Malware

Malware

Fighting Malicious Code

by Ed Skoudis, Lenny Zeltser

Publisher Prentice Hall Professional
Published Date 2004
Page Count 647
Categories Computers / Security / Viruses & Malware, Computers / Database Administration & Management, Computers / Security / Network Security, Computers / Networking / Vendor Specific, Computers / Security / General, True Crime / Cybercrime, Computers / Networking / General
Language EN
Average Rating 4 (based on 3 ratings)
Maturity Rating No Mature Content Detected
ISBN 0131014056
Book Cover

Malicious code is a set of instructions that runs on your computer and makes your system do something that you do not want it to do. For example, it can delete sensitive configuration files from your hard drive, rendering your computer completely inoperable; infect your computer and use it as a jumping-off point to spread to all of your buddies' computers; and steal files from your machine. Malicious code in the hands of a crafty attacker is indeed powerful. It's becoming even more of a problem because many of the very same factors fueling the evolution of the computer industry are making our systems even more vulnerable to malicious code. Specifically, malicious code writers benefit from the trends toward mixing static data and executable instructions, increasingly homogenous computing environments, unprecedented connectivity, an ever-larger clueless user base, and an unfriendly world. Skoudis addressed malicious code in just one chapter of his previous book. Here, a dozen chapters focus on one of the most interesting and rapidly developing areas of computer attacks.*Chapter 11, "Defender's Toolbox," rolls together the defensive strategies described in the book. As a bonus, Skoudis gives recipes for creating your own malicious code analysis laboratory using cheap hardware and software.

More Information
  • Views 36
  • Created
  • Last Reply

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

Important Information

Terms of Use Privacy Policy Guidelines We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.