Search:

Type: Posts; User: bogsheet; Keyword(s):

Search: Search took 0.08 seconds.

  1. Replies
    31
    Views
    37,291

    i am glad we now seem to be in the realms of a...

    i am glad we now seem to be in the realms of a proper discussion.

    in the case of a subseven-type backdoor trojan, the password protection you refer to is a remote authentication presented by the...
  2. Replies
    31
    Views
    37,291

    nihil your question was a good one - it is true...

    nihil your question was a good one - it is true that malware authors do try to protect their code from analysis. the way in which they do this is by encrypting the executable. this prevents the code...
  3. Replies
    31
    Views
    37,291

    i was slightly dubious about the notion of...

    i was slightly dubious about the notion of submitting a reply on this forum for precisely the reason that it is not uncommon for such posts to descend into critical and egotistical flame wars. it...
  4. Replies
    31
    Views
    37,291

    Re: Forensic Analysis of Malcode - Step by Step

    ollydbg and SoftICE are not hex editors! these are debuggers!

    an example of a hex editor is hex workshop or hiew. these can be used to display and edit the raw hexadecimal code of a binary

    a...
Results 1 to 4 of 4