16,567 research outputs found

    History of malware

    Full text link
    In past three decades almost everything has changed in the field of malware and malware analysis. From malware created as proof of some security concept and malware created for financial gain to malware created to sabotage infrastructure. In this work we will focus on history and evolution of malware and describe most important malwares.Comment: 11 pages, 8 figures describing history and evolution of PC malware from first PC malware to Stuxnet, DoQu and Flame. This article has been withdrawed due some errors in text and publication in the jurnal that asked to withdraw article from other source

    The Use of Firewalls in an Academic Environment

    No full text

    Community Self Help

    Get PDF
    This paper advocates controlling crime through a greater emphasis on precautions taken not by individuals, but by communities. The dominant battles in the literature today posit two central competing models of crime control. In one, the standard policing model, the government is responsible for the variety of acts that are necessary to deter and prosecute criminal acts. In the other, private self-help, public law enforcement is largely supplanted by providing incentives to individuals to self-protect against crime. There are any number of nuances and complications in each of these competing stories, but the literature buys into this binary matrix

    Idiergy and the Second Law

    Get PDF

    The Cord Weekly (November 4, 1998)

    Get PDF

    Методичні вказівки з розвитку навичок читання спеціальної літератури за фахом

    Get PDF
    Дані методичні вказівки призначені для самостійної та аудиторної роботи студентів І-ІІI курсів факультету КІТ. Вони мають за мету розвиток навичок читання літератури за фахом, з використанням типових завдань з технік анотування та реферування, спрямованих на краще оволодіння змістом. Матеріал вказівок містить 15 текстів, присвячених різним галузям інформатики та обчислювальної техніки, а також інформаційних технологій. Дані методичні вказівки складено на базі матеріалів автентичного курсу, розробленого Оксфордським університетом, а також з використанням матеріалів Інтернету

    Command & Control: Understanding, Denying and Detecting - A review of malware C2 techniques, detection and defences

    Full text link
    In this survey, we first briefly review the current state of cyber attacks, highlighting significant recent changes in how and why such attacks are performed. We then investigate the mechanics of malware command and control (C2) establishment: we provide a comprehensive review of the techniques used by attackers to set up such a channel and to hide its presence from the attacked parties and the security tools they use. We then switch to the defensive side of the problem, and review approaches that have been proposed for the detection and disruption of C2 channels. We also map such techniques to widely-adopted security controls, emphasizing gaps or limitations (and success stories) in current best practices.Comment: Work commissioned by CPNI, available at c2report.org. 38 pages. Listing abstract compressed from version appearing in repor

    Spartan Daily, April 22, 1993

    Get PDF
    Volume 100, Issue 52https://scholarworks.sjsu.edu/spartandaily/8410/thumbnail.jp

    Spartan Daily, November 21, 2019

    Get PDF
    Volume 153, Issue 38https://scholarworks.sjsu.edu/spartan_daily_2019/1081/thumbnail.jp
    corecore