Thank you for picking up the Second Edition of our book, Hacking Exposed™: Malware and Rootkits. There have been many changes since the first edition of the book was published, and those changes and updates are reflected in this new edition without sacrificing the historical relevance of the information previously published in the First Edition. We build on the First Edition by citing the various improvements and changes in the techniques used by attackers and how security researchers have adapted to thwart the new malware technologies and methodologies being developed and used today.
In keeping with the spirit of the First Edition, we focus on the protections that do and do not work in solving the malware threat. As the original Hacking Exposed™ books emphasize, whether you’re a home user or part of the security team for a Global 100 company, you must be vigilant. Keep a watchful eye on malware and you’ll be rewarded—personally and professionally.
We have used the popular Hacking Exposed™ format for this book; every attack technique is highlighted in the margin like this:
Making it easy to identify specific malware types and methodologies.
Every attack is countered with practical, relevant, field-tested workarounds, which have their own special icon:
Get right to fixing the problem and keeping the attackers out.
• Pay special attention to highlighted user input as bold text in the code listing.
• Most attacks are accompanied by an updated Risk Rating derived from three components based on the authors’ combined experience:
We’ve also made use of use of visually enhanced icons to highlight those nagging little details that often get overlooked.
3.137.187.233