Suppose that you are a computer virus writer; hence, you know that you need to store a copy of the code for your virus inside the virus itself. Moreover, suppose you know that a security administrator is also aware of this fact and will be using it to detect the presence of your virus in operating systems files, as described in the previous problem. Explain how you can hide the embedded copy of

your virus so that it is difficult for the security administrator to find it.

What will be an ideal response?


If the embedded virus code is stored in encrypted form and only decrypted just
before it is replicated in another operating system file, then it would be difficult to see the
repeated pattern when the virus is at rest inside the infected file.

Computer Science & Information Technology

You might also like to view...

In a bubble sort that is sorting an array named scores in ascending order, what would be the index of the element with the value 93 at the end of the first outer pass?

Declare Integer scores[6] = 89, 52, 93, 78, 86 a. 0 b. 3 c. 4 d. 5

Computer Science & Information Technology

A ________ enables individuals to select from a list or to type a value

A) menu box B) combo box C) list box D) label box

Computer Science & Information Technology

Encryption is more than simple password protection; it prevents users from:

A) editing the file. B) opening the file. C) deleting the file. D) saving the file.

Computer Science & Information Technology

During an interview for a help desk position, directed questions are often used to find out whether an applicant has specific educational or work experience.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology