Some computer virus authors have made use of cryptography themselves, in attempts to make their creations more difficult to detect or more difficult to analyse, or as part of the destructive or annoying payloads they carry. While cryptography does not play a key role in most of the viruses currently responsible for the virus problem, the issue of cryptography in computer viruses is worth at least a passing glance. The most common use of encryption in computer viruses is as part of polymorphism. A polymorphic virus is one that changes form as it spreads, so that two different files infected with the virus will not necessarily have any significant byte-strings in common. In machine-language viruses, polymorphism is usually achieved by splitting the virus into three different sections: a short piece of decryptor code, a cryptographic key, and the main functional part of the virus. When the virus creates a new copy of itself, it selects a new cryptographic key, encrypts the main functional part of itself with that key, and generates (using any of a variety of methods) a new implementation of the decryptor code.
Projects, Thesis, Final Year Projects, IT, MBA, Seminar
Projects, Thesis, Final Year Projects, IT, MBA, Seminar
Donate To Maintain This Blog
Dear Readers,
Donate (INR 1/-)At-least To Maintain This ProjectsWorlds
Total Pageviews
Most Popular Posts
-
Leather Technology Seminar Topics And Project Topics Titles (B.tech/ B.E Leather Technology) List given Below are the Seminar Topics And pro...
-
Download this project with code below : This is a (ECE) Electronics and Communication Project report on GSM based Micro-controller Irrigati...
-
Presentation On Beyond Airbus 380 - Aeronautical Engineering Similar to all aircrafts AIRBUS A380 also uses evacuation slides to sav...
-
This is a Mechanical Engineering project report on Rotary Drum Vacuum Filter. Rotary drum vacuum filter is a solid liquid filtration equipme...
-
Haptics refers to sensing and manipulationn through touch. The word comes from thee Greek ‘haptesthai’, meaning ‘to touch’.The histo...
-
“Recent trends in mobile communication” (E-TICKETING THROUGH MOBILES) Contents : 1 .Abst...
-
Paper Presentation on BIOMETRICS This present century is full of inventions and discovery, which lead to the invention of many sophis...
-
The current cellular networks use many different, in compatible standards which relay on different frequency modulation techniques. T...
-
Title : A Sensor Network Data Aggregation Technique Abstract: This paper is on the Existing sensor network data aggregation techniques ass...
-
Powerpoint Presentation of Nanotechnology in Medicine The prefix “nano”is a Greek word for “dwarf” One nanometer (nm) is equal to one-b...
DEAR READERS: As There is problem in www.projectsworld.co.cc It is changed to
www.projectsworlds.blogspot.com
For Any Feedback and Suggestions send mail.
If There is any problem in the Document View or Download please send mail to projectsworld@live.com
www.projectsworlds.blogspot.com
For Any Feedback and Suggestions send mail.
If There is any problem in the Document View or Download please send mail to projectsworld@live.com