I would like to understand spyware better. how are signatures made? I think personally that the path and name will be the signature so they can be located and cleaned. What do you think, can you help me out how it would be done? it is appreciated. Inf.
I really cannot believe my eyes, you don't have a clue ? just tell me how you think they do it. Thanx