Search ID

www.megapanzer.com

An introduction to computer malware from an analyst's point of view. The blog offers code examples and explanations on how a Trojan horse intrudes a system and how it protects itself from being detected.

URLs from www.megapanzer.com:

URL: http://www.megapanzer.com/ URL: http://www.megapanzer.com/2009/05/06/nine_ways_how_hackers_propagate_malware_one/

Tags: 

URL: http://www.megapanzer.com/2009/05/29/security-related-podcasts/ URL: http://www.megapanzer.com/2009/06/30/unanonymity-php-script-to-reveal-user-data/ URL: http://www.megapanzer.com/2009/08/10/unanonymity-0-3-php-script-to-reveal-user-data/ URL: http://www.megapanzer.com/2009/08/25/skype-trojan-sourcecode-available-for-download/ URL: http://www.megapanzer.com/2009/09/08/extracting-skype-logfile-entries-with-skype4loganalyzer/ URL: http://www.megapanzer.com/source-code/