Weather

My Archives

Calendar

April 2011
S M T W T F S
 12
3456789
10111213141516
17181920212223
24252627282930

ClustrMaps

Login

Борьба со спамом

Share this:

Оказывается, в этих войнах со спамом и ботами можно побеждать.

Статья об этом (англ.) по ссылке от [info]Антона Носика.

Beta versions of the Rustock malware first emerged in late 2005 or early 2006. Unlike many pieces of malware, Rustock was subtle. After infecting a machine it would lie dormant for five days, to avoid suspicion and make it harder to track down the infection source. It wasn’t until the third version, Rustock.C, was released in summer 2006 that the network really began to grow. Thanks to a range of advanced rootkit techniques—complex encryption, disabling of debuggers, and a tendency to delete itself if it detected attempts to capture it—Rustock.C evaded detection for many months, with definitive detection and analysis not occurring until early 2008. By this time, hundreds of thousands of machines had been infected, with more to follow.

Pages: 1 2

Leave a Reply