Some computer virus authors have made use of cryptography themselves, in attempts to make their creations more difficult to detect or more difficult to analyse, or as part of the destructive or annoying payloads they carry. While cryptography does not play a key role in most of the viruses currently responsible for the virus problem, the issue of cryptography in computer viruses is worth at least a passing glance. The most common use of encryption in computer viruses is as part of polymorphism. A polymorphic virus is one that changes form as it spreads, so that two different files infected with the virus will not necessarily have any significant byte-strings in common. In machine-language viruses, polymorphism is usually achieved by splitting the virus into three different sections: a short piece of decryptor code, a cryptographic key, and the main functional part of the virus. When the virus creates a new copy of itself, it selects a new cryptographic key, encrypts the main functional part of itself with that key, and generates (using any of a variety of methods) a new implementation of the decryptor code.
Projects, Thesis, Final Year Projects, IT, MBA, Seminar
Projects, Thesis, Final Year Projects, IT, MBA, Seminar
Donate To Maintain This Blog
Dear Readers,
Donate (INR 1/-)At-least To Maintain This ProjectsWorlds
Total Pageviews
Most Popular Posts
-
Leather Technology Seminar Topics And Project Topics Titles (B.tech/ B.E Leather Technology) List given Below are the Seminar Topics And pro...
-
MBA Finance And Marketing Project On Mutual Fund is Bette Investment Plan This is a MBA finance project report on the Mutual Fund Is Better...
-
“Recent trends in mobile communication” (E-TICKETING THROUGH MOBILES) Contents : 1 .Abst...
-
Haptics refers to sensing and manipulationn through touch. The word comes from thee Greek ‘haptesthai’, meaning ‘to touch’.The histo...
-
Title: Wireless Power Transmission via Solar Power Satellite This is a EEE And Electronics Project And Paper Presentation Brief Intro & ...
-
This is a MBA Project On Working Capital Management is an art of anticipating and preparing for risks, uncertainties and overcoming obstacle...
-
Title: An Adaptive Mac Protocol for Wireless Multi-Hop Networks with Multiple Antennas Master of Science: Department of Electrical Engineeri...
-
Title: A Sensor Network Data Aggregation Technique Department of Computer Science Abstract: This is a Computer Science M.Sc Thesis on Exist...
-
VECTOR STEGANOGRAPHY A HIGH DEGREE OF SECURITY Under NETWORK SECURITY AND PROTOCOLS Steganography is any "technique of hiding s...
-
This is a B.Pharma Seminar and project report on Colonic Drug Delivery system. The colonic region of gastro intestinal tract become and incr...
DEAR READERS: As There is problem in www.projectsworld.co.cc It is changed to
www.projectsworlds.blogspot.com
For Any Feedback and Suggestions send mail.
If There is any problem in the Document View or Download please send mail to projectsworld@live.com
www.projectsworlds.blogspot.com
For Any Feedback and Suggestions send mail.
If There is any problem in the Document View or Download please send mail to projectsworld@live.com