Sunday, March 14, 2010

Methods to avoid detection

In order to avoid investigation by users, some viruses of various types of fraud jobs. MS in particular, some old viruses, DOS platform, make sure that 'a host file last modified date "as the file is infected with the virus. This approach is not anti-virus software, game, however, particularly Change the file to hold the date of cyclic redundancy check.
Some viruses without increasing its size or damaged files can infect files. They all executable files by overwriting unused areas. These are called cavity viruses. For example CIH virus, or Chernobyl Virus, portable executable files infected. Because many files are empty gaps, the virus, which in length 1 KB, the file size was not increased.
Some virus related to antivirus software can detect it before killing try to avoid detection.
As computers and operating systems grow more complex, old hiding techniques need to replace or update. A computer against viruses may demand an explanation that uses a file system file for each type of detailed and clearly allowed to stay.

No comments:

Post a Comment