Hello Markus,
Le vendredi 2 Septembre 2005 01:00, Markus Beck a écrit :
> Hello Arnaud,
>
> On Thu, 1 Sep 2005 23:33:26 +0200
>
> "Securiteinfo.com" <[EMAIL PROTECTED]> wrote:
> > Well, to create a Clamav signature, you can read this first :
> > http://www.clamav.net/doc/0.86.2/signatures.pdf
>
>
Hello Arnaud,
On Thu, 1 Sep 2005 23:33:26 +0200
"Securiteinfo.com" <[EMAIL PROTECTED]> wrote:
> Well, to create a Clamav signature, you can read this first :
> http://www.clamav.net/doc/0.86.2/signatures.pdf
So, would this be a good and working Signature (leaving anything about
codeexecution outs
Hello Markus,
Le jeudi 1 Septembre 2005 23:11, Markus Beck a écrit :
> Hello Arnaud,
>
> thank You for Your fast answer!
>
> On Thu, 1 Sep 2005 18:18:04 +0200
>
> "Securiteinfo.com" <[EMAIL PROTECTED]> wrote:
> > There is different techniques to create a signature. One is to base
> > the signatur
Hello Arnaud,
thank You for Your fast answer!
On Thu, 1 Sep 2005 18:18:04 +0200
"Securiteinfo.com" <[EMAIL PROTECTED]> wrote:
> There is different techniques to create a signature. One is to base
> the signature against the executable code of the malware. In that
> way, many different variant (
Hello Markus,
Le jeudi 1 Septembre 2005 17:47, Markus Beck a écrit :
> Hello everybody,
>
> which techniques are implemented in clamav so far as to recognize
> little derivates of malware? I'm thinking about versions of
> Phatbots using only e.g. different IRC-Channels: Wouldn't be their
> signatu
Hello everybody,
which techniques are implemented in clamav so far as to recognize
little derivates of malware? I'm thinking about versions of
Phatbots using only e.g. different IRC-Channels: Wouldn't be their
signatures different, too?
Markus
___
http: