Some computer virus authors have made use of cryptography themselves, in attempts to make their creations more difficult to detect or more difficult to analyse, or as part of the destructive or annoying payloads they carry. While cryptography does not play a key role in most of the viruses currently responsible for the virus problem, the issue of cryptography in computer viruses is worth at least a passing glance. The most common use of encryption in computer viruses is as part of polymorphism. A polymorphic virus is one that changes form as it spreads, so that two different files infected with the virus will not necessarily have any significant byte-strings in common. In machine-language viruses, polymorphism is usually achieved by splitting the virus into three different sections: a short piece of decryptor code, a cryptographic key, and the main functional part of the virus. When the virus creates a new copy of itself, it selects a new cryptographic key, encrypts the main functional part of itself with that key, and generates (using any of a variety of methods) a new implementation of the decryptor code.
Projects, Thesis, Final Year Projects, IT, MBA, Seminar
Projects, Thesis, Final Year Projects, IT, MBA, Seminar
Donate To Maintain This Blog
Dear Readers,
Donate (INR 1/-)At-least To Maintain This ProjectsWorlds
Total Pageviews
Most Popular Posts
-
Leather Technology Seminar Topics And Project Topics Titles (B.tech/ B.E Leather Technology) List given Below are the Seminar Topics And pro...
-
An embedded system is a special-purpose computer system designed to perform one or a few dedicated functions, sometimes with real-ti...
-
Title: Lean Re-manufacturing – Material Flows at Volvo Parts Flen Master Thesis: Department of Business Studies Abstract: The after market ...
-
ECE And EEE Engineering Related Seminar Topics And Project Titles And PPT's List given Below are the Seminar Topics And project Titles f...
-
Engineering Project Title And Seminar Topics For Electronics and Electrical List Below is for Graduates And Under Graduates of Electronics a...
-
Introduction To Redtacton Working principle. Human safety Human area network Features of red tacton Application fields Comparison wi...
-
The Internet or the global Internet is the internationally connected network of computer networks with addresses that are administrate...
-
The term Service Oriented Architecture (SOA) has become a pervasive buzz word, although fundamentally there is nothing new about the...
-
Efficient Job Scheduling in Grid Computing with Modified Artificial Fish Swarm Algorithm Abstract of Project : One of the open issues in gr...
-
A robot person who works mechanically without original thought, especially one who responds automatically to the commands of others. ...
DEAR READERS: As There is problem in www.projectsworld.co.cc It is changed to
www.projectsworlds.blogspot.com
For Any Feedback and Suggestions send mail.
If There is any problem in the Document View or Download please send mail to projectsworld@live.com
www.projectsworlds.blogspot.com
For Any Feedback and Suggestions send mail.
If There is any problem in the Document View or Download please send mail to projectsworld@live.com