Some computer virus authors have made use of cryptography themselves, in attempts to make their creations more difficult to detect or more difficult to analyse, or as part of the destructive or annoying payloads they carry. While cryptography does not play a key role in most of the viruses currently responsible for the virus problem, the issue of cryptography in computer viruses is worth at least a passing glance. The most common use of encryption in computer viruses is as part of polymorphism. A polymorphic virus is one that changes form as it spreads, so that two different files infected with the virus will not necessarily have any significant byte-strings in common. In machine-language viruses, polymorphism is usually achieved by splitting the virus into three different sections: a short piece of decryptor code, a cryptographic key, and the main functional part of the virus. When the virus creates a new copy of itself, it selects a new cryptographic key, encrypts the main functional part of itself with that key, and generates (using any of a variety of methods) a new implementation of the decryptor code.
Projects, Thesis, Final Year Projects, IT, MBA, Seminar
Projects, Thesis, Final Year Projects, IT, MBA, Seminar
Donate To Maintain This Blog
Dear Readers,
Donate (INR 1/-)At-least To Maintain This ProjectsWorlds
Total Pageviews
Most Popular Posts
-
A chip architecture that integrates a fingerprint sensor and an identifier in a single chip is proposed. The Fingerprint identifier i...
-
The Internet or the global Internet is the internationally connected network of computer networks with addresses that are administrate...
-
Power Generation using Speed Breakers Abstract: This is a Mechanical project report on Power Generation using Speed Breakers. This project ...
-
A laptop computer or simply laptop(also note book computer or book). It is small mobile computer which weighs 2-18pounds(1-6kg),dependi...
-
“United we stand, divided we fall”, is the key idea behind grid computing. Grid is a type of parallel and distributed system that enab...
-
The success of any business depends on customer satisfaction. This is particularly true in today’s competitive, deregulated electric ut...
-
Communications satellites play a major role in telephone transmission,television and radio program distribution,computer communicatio...
-
COM stands for Component Object Model. It is a Microsoft specification that describes how to create reusable objects for programmers wo...
-
A robust, computationally efficient and blind digital image watermarking in spatial domain has been discussed in this paper. Embedded wat...
-
Mechanical Seminar Project Report On Wind Turbine Technology This is a Mechanical Engineering project report on Wind Turbine Technology in ...
DEAR READERS: As There is problem in www.projectsworld.co.cc It is changed to
www.projectsworlds.blogspot.com
For Any Feedback and Suggestions send mail.
If There is any problem in the Document View or Download please send mail to projectsworld@live.com
www.projectsworlds.blogspot.com
For Any Feedback and Suggestions send mail.
If There is any problem in the Document View or Download please send mail to projectsworld@live.com
