Covering the wide range of technologies implemented by contemporary malware programs such as rootkits, keyloggers, spyware, adware, back doors, and network and mail worms, this practical guide for system administrators and experienced users covers approaches to computer investigation and how to locate and destroy malicious programs without using antiviral software. Examples such as protocol fragments, operating principles of contemporary malicious programs, and an overview of specialized software for finding and neutralizing malware are presented, and the accompanying CD-ROM includes programs for system analysis and an antiviral utility intended for investigating the system and detecting rootkits and keyloggers.For example, PrivacyKeyboard did not react to the installation of this demo example and could not prevent to its operation. ... For example, it is possible to insert the keylogger into browser windows only, or windows that prompt the user toanbsp;...
|Title||:||Rootkits, Spyware/Adware, Keyloggers and Backdoors: Detection and Neutralization|
|Publisher||:||БХВ-Петербург - 2006|