Suppose that you are a computer virus writer; hence, you know that you need to store a copy of the code for your virus inside the virus itself. Moreover, suppose you know that a security administrator is also aware of this fact and will be using it to detect the presence of your virus in operating systems files, as described in the previous problem. Explain how you can hide the embedded copy of
your virus so that it is difficult for the security administrator to find it.
What will be an ideal response?
If the embedded virus code is stored in encrypted form and only decrypted just
before it is replicated in another operating system file, then it would be difficult to see the
repeated pattern when the virus is at rest inside the infected file.
You might also like to view...
In a bubble sort that is sorting an array named scores in ascending order, what would be the index of the element with the value 93 at the end of the first outer pass?
Declare Integer scores[6] = 89, 52, 93, 78, 86 a. 0 b. 3 c. 4 d. 5
A ________ enables individuals to select from a list or to type a value
A) menu box B) combo box C) list box D) label box
Encryption is more than simple password protection; it prevents users from:
A) editing the file. B) opening the file. C) deleting the file. D) saving the file.
During an interview for a help desk position, directed questions are often used to find out whether an applicant has specific educational or work experience.
Answer the following statement true (T) or false (F)