Wemoweh Code
Since many network security components work by identifying either suspicious behavior or known code signatures, how worried should we be about worms that sleep on our systems? Part of me says that the possibility of malicious code, digital Manchurian Candidates...
July 16, 2004
Since many network security components work by identifying either suspicious behavior or known code signatures, how worried should we be about worms that sleep on our systems?
Part of me says that the possibility of malicious code, digital Manchurian Candidates that wait until a specific trigger is provided, is a good argument for checksumming every file on your system and doing a regular scan. The other part of me says to get real, and lose the paranioa. For now, keeping tabs on behavior is as good as it gets, but I've now got a new reason to pop awake at 0330 and stare at the ceiling. It's just what I needed.
Oh, yeah, if you're wondering about the title--go listen to "The Weavers at Carnegie Hall. All will be explained.
How to Amplify DevOps with DevSecOps
May 22, 2024Generative AI: Use Cases and Risks in 2024
May 29, 2024Smart Service Management
June 4, 2024