antonborisov: (Default)
[personal profile] antonborisov

Оказывается, в этих войнах со спамом и ботами можно побеждать.

Статья об этом (англ.) по ссылке от [info]Антона Носика.

Beta versions of the Rustock malware first emerged in late 2005 or early 2006. Unlike many pieces of malware, Rustock was subtle. After infecting a machine it would lie dormant for five days, to avoid suspicion and make it harder to track down the infection source. It wasn’t until the third version, Rustock.C, was released in summer 2006 that the network really began to grow. Thanks to a range of advanced rootkit techniques—complex encryption, disabling of debuggers, and a tendency to delete itself if it detected attempts to capture it—Rustock.C evaded detection for many months, with definitive detection and analysis not occurring until early 2008. By this time, hundreds of thousands of machines had been infected, with more to follow.

Полностью.

В общем, во всем и всегда самое главное — желание. Желание бороться, в этом случае.

Ничего нового.


Запись оттранслирована из моего журнала
Комментировать можно здесь или по ссылке
http://www.a-borisov.com/2011/04/06/borba-so-spamom/

Profile

antonborisov: (Default)
antonborisov

May 2020

S M T W T F S
     12
3456789
10 111213141516
17181920212223
24252627282930
31      

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags
Page generated Aug. 3rd, 2025 12:16 pm
Powered by Dreamwidth Studios