Hello Arnaud,

thank You for Your fast answer!

On Thu, 1 Sep 2005 18:18:04 +0200
"Securiteinfo.com" <[EMAIL PROTECTED]> wrote:
> There is different techniques to create a signature. One is to base
> the  signature against the executable code of the malware. In that
> way, many  different variant (e.g. different IRC-Channels used in this
> case) could be  caught.

Where can I read about/learn how to do that correctly? I already
consulted man sigtool, but it contains not a lot of things about its
background.

Sincerely,
Markus
_______________________________________________
http://lurker.clamav.net/list/clamav-users.html

Reply via email to