Computer Viruses: from theory to applications
“Viruses don’t harm, ignorance does. Is ignorance a defense?” herm1t “[...] I am convinced that computer viruses are not evil and that programmers have a right to create them, to possess them and to experiment with them ... truth seekers and wise men have been per- ́ secuted by powerful idiots in every age ...’ Mark A. Ludwig Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers. Article 19 of Universal Declaration of Human Rights The purpose of this book is to propose a teaching approach to under- 1 stand what computer viruses really are and how they work. To do this, three aspects are covered ranging from theoretical fundamentals, to pr- tical applications and technical features; fully detailed, commented source 1 We will systematically use the plural form “viruses” instead of the litteral one “virii”. The latter is now an obsolete, though gramatically recommended, form. VIII Preface codes of viruses as well as inherent applications are proposed. So far, the applications-oriented aspects have hardly ever been addressed through the scarce existing literature devoted to computer viruses.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Other editions - View all
Adleman algorithmics analysis antiviral programs antivirus software applications attack automata automaton bashrc binary BIOS code boot sector bytes cdrom cell cellular cellular automata chapter char CIH virus command companion virus computer infection programs computer security computer virology computer viruses configuration consider contains copy defined Definition denoted efficient encryption environment Epeian error example executable file exists fact final payload flaws formalization Fred Cohen hard disk host implement infected file infective power instructions interested reader Internet Worm language logic bombs malware Master Boot Record mechanisms memory mode modify Neumann’s operating system overinfection password performed polymorphic present problem procedure reader will refer recursive functions result routine script Section self-reproducing sequence servers signature source code spread stealth target file techniques Theorem Trojan horse Turing machine Unix user’s variant viral code viral detection viral programs viral set virus writer Xanax