Author Topic: Interesting book for protectors  (Read 2617 times)

0 Members and 1 Guest are viewing this topic.

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33900
  • malware fighter
Interesting book for protectors
« on: March 10, 2006, 01:37:47 PM »
Hello forum members,

The security aware know that techniques can be used for good purposes or towards bad. But we have to know about them for our own good, even when it is considered now controversial knowledge. Read this book on this topic here:
http://www.acm.uiuc.edu/sigmil/RevEng/ch01.html
Also see: http://www.felinemenace.org/papers/reversing_workshop.pdf

Enjoy,

polonus
« Last Edit: March 10, 2006, 02:16:06 PM by polonus »
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline bob3160

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 48562
  • 64 Years of Happiness
    • bob3160 Protecting Yourself, Your Computer and, Your Identity
Re: Interesting book for protectors
« Reply #1 on: March 10, 2006, 02:47:42 PM »
Dear polonus,
Quote
But we have to know about them for our own good
I just have to know which programs to use so that if a program has been tampered with,
it doesn't cause any damage on my computer. :)
Free Security Seminar: https://bit.ly/bobg2023  -  Important: http://www.organdonor.gov/ -- My Web Site: http://bob3160.strikingly.com/ - Win 11 Pro v22H2 64bit, 16 Gig Ram, 1TB SSD, Avast Free 23.5.6066, How to Successfully Install Avast http://goo.gl/VLXdeRepair & Clean Install https://goo.gl/t7aJGq -- My Online Activity https://bit.ly/BobGInternet

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33900
  • malware fighter
Re: Interesting book for protectors
« Reply #2 on: March 10, 2006, 03:41:18 PM »
Hi Bob3160,

That is just what it is all about. The only one that should trust the programs on your computer is you. That is why you could use a tool like FileAlyzer from here: http://www.snapfiles.com/get/filealyzer.html
In this case you can see what packers were used, if the hashes were right as the original software was meant to be. The only one that could see whether a program was resource engineerted should be you. Learn to use a good hex viewer too.

polonus
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!