Quantcast
Channel: Malicious Code
Browsing latest articles
Browse All 9 View Live

Image may be NSFW.
Clik here to view.

A Summary of Avinash Kak’s Lecture Notes on Malware

Avinash Kak, in his lecture notes “Malware: Viruses and Worms“, aims to help a beginning students learn some of the basic concepts about malware. To accomplish this, Kak first starts out by describing...

View Article



Image may be NSFW.
Clik here to view.

The Dictionary Attack – A Summary with Social Context Analysis

As the title suggests, in this post I will be summarizing information on the dictionary attack based on the lecture notes “Password Protected Systems and the Annoying Dictionary Attack” by Avinash Kak....

View Article

Image may be NSFW.
Clik here to view.

Some Useful Links

Here are a two useful links: Avinash Kak’s Computer and Network Security Lecture Notes - I’ve already summarized and analyzed two sets of lecture notes from this set of notes for Kak’s course on...

View Article

Image may be NSFW.
Clik here to view.

Summary and Analysis of “An Undetectable Computer Virus” by Chess and White

In An Undetectable Computer Virus the authors David M. Chess an Steve R. White expand on Cohen’s result that there is no algorithm that can perfectly detect all possible viruses by showing that there...

View Article

Image may be NSFW.
Clik here to view.

The If Statement

In my previous post titled Summary and Analysis of “An Undetectable Computer Virus” by Chess and White I quoted and used something called pseudocode in order to help present the argument. I, like Chess...

View Article


Image may be NSFW.
Clik here to view.

Summary and Analysis of an article on Cryptovirology

In “A Review Report on Cryptovirology and Cryptography” the authors Abidin, Kumar, and Tiwari give a brief introduction to Cryptovirology which is the study of the applications of Cryptography,...

View Article

Image may be NSFW.
Clik here to view.

A Video Tutorial on Local Viruses

In the following video a YouTube user gives a tutorial on how to create a couple simple, local viruses for Windows Operating Systems with the virus code being written in Batch. By a local virus we mean...

View Article

Image may be NSFW.
Clik here to view.

A Short Video Overview Of Stuxnet

The following video gives a short overview of the computer worm known as Stuxnet, which is the first (known) cyber weapon. This video does not go in to extreme detail about the worm but gives the...

View Article


Image may be NSFW.
Clik here to view.

“Inside the Slammer Worm”– A Summary and Analysis

On Saturday, 25 January 2004, a worm so fast that human response time was useless started to infect machines. This worm is known as Slammer (or Sapphire) and it successfully infected more than 90...

View Article

Browsing latest articles
Browse All 9 View Live




Latest Images