Chapter 8. Classification According to Payload
“ I think computer viruses should count as life. I think it says something about human nature that the only form of life we have created so far is purely destructive. We've created life in our own image.”
—Stephen Hawking
This chapter describes the most common computer-virus activation methods. Computer viruses can use an endless number of events to trigger their activation routines. Common examples of such events include, but are not limited to, the following basic methods:
• System date or time
• A particular file's file date stamp
• A particular filename
• The default language setting of the system
• The name of a visited Web site
• The system's IP address
• The operating system used
• A particular ...
Get Art of Computer Virus Research and Defense, The now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.