Hello Arnaud, thank You for Your fast answer!
On Thu, 1 Sep 2005 18:18:04 +0200 "Securiteinfo.com" <[EMAIL PROTECTED]> wrote: > There is different techniques to create a signature. One is to base > the signature against the executable code of the malware. In that > way, many different variant (e.g. different IRC-Channels used in this > case) could be caught. Where can I read about/learn how to do that correctly? I already consulted man sigtool, but it contains not a lot of things about its background. Sincerely, Markus _______________________________________________ http://lurker.clamav.net/list/clamav-users.html