learn linux and unix commands - unix shell scripting

Malware analysis

 
Thread Tools Search this Thread
# 1  
Old 11-21-2010
Malware analysis

A collection of resources (mostly online) that will help those interested get started working towards an understanding of how to pick apart malware, see what it does, and how to protect against it.

Image
Image

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

3 More Discussions You Might Find Interesting

1. UNIX for Beginners Questions & Answers

Help to remove malware

hello I hope you have a good day, no question is because a few days ago I did a malware scan to my debian and showed me that I have malware, and searched and not found how I can eliminate it, would be useful if someone knows how to You can delete or uninstall, thank you very much (2 Replies)
Discussion started by: asoh65
2 Replies

2. Cybersecurity

Virus/Malware Uptake Rates

Hi. I'm trying to get information about the rates at which viruses and malware infect computers. Let's say that Mr. Dastardly Developer discovers an exploitable flaw, writes a virus to take advantage of it, and releases the virus. Assuming that a large-scale attack method is chosen (Facebook,... (2 Replies)
Discussion started by: treesloth
2 Replies

3. UNIX Desktop Questions & Answers

Virus and Malware

How do i manage virus and melware in Unix ? (2 Replies)
Discussion started by: Suriano10
2 Replies
Login or Register to Ask a Question
PROTECT(1)						    BSD General Commands Manual 						PROTECT(1)

NAME
protect -- protect processes from being killed when swap space is exhausted SYNOPSIS
protect [-i] command protect [-cdi] -g pgrp | -p pid DESCRIPTION
The protect command is used to mark processes as protected. The kernel does not kill protected processes when swap space is exhausted. Note that this protected state is not inherited by child processes by default. The options are: -c Remove protection from the specified processes. -d Apply the operation to all current children of the specified processes. -i Apply the operation to all future children of the specified processes. -g pgrp Apply the operation to all processes in the specified process group. -p pid Apply the operation to the specified process. command Execute command as a protected process. Note that only one of the -p or -g flags may be specified when adjusting the state of existing processes. EXIT STATUS
The protect utility exits 0 on success, and >0 if an error occurs. EXAMPLES
Mark the Xorg server as protected: pgrep Xorg | xargs protect -p Protect all ssh sessions and their child processes: pgrep sshd | xargs protect -dip Remove protection from all current and future processes: protect -cdi -p 1 SEE ALSO
procctl(2) BUGS
If you protect a runaway process that allocates all memory the system will deadlock. BSD
September 19, 2013 BSD