Virtualizing


Virtualizing is the act of operating from a virtual machine. This enables you to acquire any number of rootkits, worms, trojans, spyware, and other unwanted software without the fear of persistence, since a new virtual machine can be started at any time.

The problem with virtual intrusion prevention is that it is limited to file operations. Unfortunately, malware can target e-mail and shared file resources that are persistent. In addition, removing malware by restarting your virtual machine doesn’t help the 20 friends you inadvertently infected before you realized something was amiss.




Professional Rootkits
Professional Rootkits (Programmer to Programmer)
ISBN: 0470101547
EAN: 2147483647
Year: 2007
Pages: 229
Authors: Ric Vieler

Similar book on Amazon
Rootkits: Subverting the Windows Kernel
Rootkits: Subverting the Windows Kernel
A Guide to Kernel Exploitation: Attacking the Core
A Guide to Kernel Exploitation: Attacking the Core
Reversing: Secrets of Reverse Engineering
Reversing: Secrets of Reverse Engineering
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net