Introduction

Thank you for picking up the Second Edition of our book, Hacking Exposed™: Malware and Rootkits. There have been many changes since the first edition of the book was published, and those changes and updates are reflected in this new edition without sacrificing the historical relevance of the information previously published in the First Edition. We build on the First Edition by citing the various improvements and changes in the techniques used by attackers and how security researchers have adapted to thwart the new malware technologies and methodologies being developed and used today.

In keeping with the spirit of the First Edition, we focus on the protections that do and do not work in solving the malware threat. As the original Hacking Exposed™ books emphasize, whether you’re a home user or part of the security team for a Global 100 company, you must be vigilant. Keep a watchful eye on malware and you’ll be rewarded—personally and professionally.

Navigation

We have used the popular Hacking Exposed™ format for this book; every attack technique is highlighted in the margin like this:

ImagesThis Is an Attack Icon

Making it easy to identify specific malware types and methodologies.

Every attack is countered with practical, relevant, field-tested workarounds, which have their own special icon:

ImagesThis Is the Countermeasure Icon

Get right to fixing the problem and keeping the attackers out.

•   Pay special attention to highlighted user input as bold text in the code listing.

•   Most attacks are accompanied by an updated Risk Rating derived from three components based on the authors’ combined experience:

Images

We’ve also made use of use of visually enhanced icons to highlight those nagging little details that often get overlooked.

Images

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.137.187.233