Torpig

Results: 22



#Item
1Botnets / Computing / Computer network security / Multi-agent systems / Spamming / Malware / Cyberwarfare / Torpig / Srizbi botnet / Command and control / Festi / Fast flux

Your Botnet is My Botnet: Analysis of a Botnet Takeover Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna University of California

Add to Reading List

Source URL: seclab.cs.ucsb.edu

Language: English - Date: 2010-12-20 14:49:07
2

Microsoft Word - iDefense_RRT_Torpig_20070703.doc

Add to Reading List

Source URL: fserror.com

Language: English - Date: 2010-01-21 18:20:18
    3X86 architecture / UPX / Computing / MOV / Assembly languages / CPUID / Computer architecture / Software / X86 instructions

    The Torpig/Anserin/Sinowal family of Trojans detect virtual machine monitors and abort infection when present

    Add to Reading List

    Source URL: www.mnin.org

    Language: English - Date: 2006-09-10 17:56:52
    4Multi-agent systems / Spamming / Cyberwarfare / Storm botnet / Storm Worm / Zombie / Waledac botnet / Torpig / Zeus / Computer network security / Computing / Botnets

    – Survey and Taxonomy of Botnet Research through Life-cycle ´ RAFAEL A. RODR´IGUEZ-GOMEZ , University of Granada ´

    Add to Reading List

    Source URL: wdb.ugr.es

    Language: English - Date: 2013-09-30 02:59:52
    5Multi-agent systems / Spamming / Cyberwarfare / Malware / Zeus / Zombie / Torpig / Conficker / Denial-of-service attack / Computer network security / Computing / Botnets

    Microsoft PowerPoint - botnet_detection2009.ppt

    Add to Reading List

    Source URL: www.infosec.gov.hk

    Language: English - Date: 2014-06-18 01:23:21
    6Multi-agent systems / Spamming / Cyberwarfare / Malware / Zeus / Zombie / Torpig / Conficker / Denial-of-service attack / Computer network security / Computing / Botnets

    Microsoft PowerPoint - botnet_detection2009.ppt

    Add to Reading List

    Source URL: www.infosec.gov.hk

    Language: English - Date: 2014-06-18 01:23:21
    7System software / Spyware / Social engineering / Zeus / Antivirus software / For Official Use Only / Computer virus / Trojan horse / Torpig / Malware / Botnets / Rootkits

    FOUO: SECURITY 1 Executive Summary On 2012, NBNCERT logged an investigation related to a suspected infected host on the NBNCO internal network. The host was "beaconing" to a server located in

    Add to Reading List

    Source URL: nbnco.com.au

    Language: English - Date: 2015-04-13 21:32:34
    8System software / Spyware / Social engineering / Zeus / Antivirus software / For Official Use Only / Computer virus / Trojan horse / Torpig / Malware / Botnets / Rootkits

    PRIVATE HEALTH INSURANCE CIRCULAR Medical Benefits Division Private Health Insurance Branch Mail Drop Point 954 GPO Box 9848 Canberra ACT 2601 ______________________________________________________________

    Add to Reading List

    Source URL: www.health.gov.au

    Language: English - Date: 2015-04-13 08:07:08
    9System software / Spyware / Social engineering / Zeus / Antivirus software / For Official Use Only / Computer virus / Trojan horse / Torpig / Malware / Botnets / Rootkits

    FOUO: SECURITY 1 Executive Summary On 2012, NBNCERT logged an investigation related to a suspected infected host on the NBNCO internal network. The host was "beaconing" to a server located in

    Add to Reading List

    Source URL: www.nbntasmania.com.au

    Language: English - Date: 2015-04-13 20:34:27
    10Multi-agent systems / Spamming / Cyberwarfare / Malware / Zeus / Zombie / Torpig / Conficker / Denial-of-service attack / Computer network security / Computing / Botnets

    Microsoft PowerPoint - botnet_detection2009.ppt

    Add to Reading List

    Source URL: www.infosec.gov.hk

    Language: English - Date: 2014-06-18 01:23:21
    UPDATE