O'Reilly logo

Operating System Forensics by Ric Messier

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10

Malware

Abstract

Investigating malware, including the different types of malware, persistence mechanisms, using external research

Keywords

operating systems
forensics
operating environments

INFORMATION INCLUDED IN THIS CHAPTER:

Malware Categories
Using Malware Researchers
Persistence
Infection Vectors
Malware Artifacts

Introduction

It is difficult to start this without using some hackneyed, clichéd expression that dramatically understates the challenge or does not put it into some useful perspective. The short version is that malware is a problem. There are millions of new types of malware developed each year. This may be an existing piece of malware that is just different enough to require a new signature, means that the ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required