![]() if you execute program.exe, the virus may create program. of embedded languages (word, excel, etc) designed to hide in those files & change configurations 3) CLUSTER VIRUSES - alters file-allocation tables causing file entries to point to the virus instead of the real flie 4) STEALTH/TUNNELING VIRUS - uses various mechanisms to evade detection systems 5) ENCRYPTION VIRUSES - reprograms itself to avoid detection 6) CAVITY/FILE-OVERWRITING VIRUSES - hides in host file without changing file’s appearance 7) SPARSE-INFECTOR VIRUSES - avoid detection by carrying out infectious actions sporadically or on files of certain length or type, etc 8) COMPANION/CAMOUFLAGE VIRUS - enables SW w/ the same name, but different extensions (i.e. is altered, can make HD undetected etc 2) MACRO VIRUSES - takes adv. Open the first terabit Virus Maker 2.8 SE 2. (please try yourself) And how to use it very easy: 1. This can be programmed to do the following things: Disable Registry Editor. This software can make a trojan type virus, some uses this software, for example: 1. With the help of this you can create any type of trojans and program it to do whatever you want. ![]() Contribute to d3元t3dOn3/Malicious development by creating an account on GitHub. Hoy dejo un poderoso creador de virus, el Terabit Virus Maker 2.8 se (la ultima version). 1) SYSTEM/BOOT SECTOR VIRUS - code in MBR (master boot record), boot seq. This is a small but very useful software. Failed to load latest commit information. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |