Some computer virus authors have made use of cryptography themselves, in attempts to make their creations more difficult to detect or more difficult to analyse, or as part of the destructive or annoying payloads they carry. While cryptography does not play a key role in most of the viruses currently responsible for the virus problem, the issue of cryptography in computer viruses is worth at least a passing glance. The most common use of encryption in computer viruses is as part of polymorphism. A polymorphic virus is one that changes form as it spreads, so that two different files infected with the virus will not necessarily have any significant byte-strings in common. In machine-language viruses, polymorphism is usually achieved by splitting the virus into three different sections: a short piece of decryptor code, a cryptographic key, and the main functional part of the virus. When the virus creates a new copy of itself, it selects a new cryptographic key, encrypts the main functional part of itself with that key, and generates (using any of a variety of methods) a new implementation of the decryptor code.
Projects, Thesis, Final Year Projects, IT, MBA, Seminar
Projects, Thesis, Final Year Projects, IT, MBA, Seminar
Donate To Maintain This Blog
Dear Readers,
Donate (INR 1/-)At-least To Maintain This ProjectsWorlds
Total Pageviews
Most Popular Posts
-
This is a MBA International Business project report on Export Process and Documentation and was submitted in partial fulfillment of PG Diplo...
-
Leather Technology Seminar Topics And Project Topics Titles (B.tech/ B.E Leather Technology) List given Below are the Seminar Topics And pro...
-
This is a B.Pharma Seminar and project report on Colonic Drug Delivery system. The colonic region of gastro intestinal tract become and incr...
-
NETWORK SECURITY STEGANOGRAPHY-ENCHANCING THE NETWORK SECURITY Steganography is the practice of encoding secret information in a...
-
Nanotechnology - What is Nano Technology ? Nanotechnology is basically a materials science which has the following features: Research ...
-
we are facing majority of crimes related to security issues and these arise due to the leakage of passwords or illegal authenticatio...
-
This is a MBA Project On Working Capital Management is an art of anticipating and preparing for risks, uncertainties and overcoming obstacle...
-
Title: A Security Analysis of Smartphones Department : Master of Science in Electrical and Computer Engineering About Project: In this thes...
-
The most modern telephone is the cellular telephone, or commonly called a cell phone. A cellular telephone is designed to give the ...
-
Application of Computer methods to Molecular Biology
DEAR READERS: As There is problem in www.projectsworld.co.cc It is changed to
www.projectsworlds.blogspot.com
For Any Feedback and Suggestions send mail.
If There is any problem in the Document View or Download please send mail to projectsworld@live.com
www.projectsworlds.blogspot.com
For Any Feedback and Suggestions send mail.
If There is any problem in the Document View or Download please send mail to projectsworld@live.com