spyware signatures

Discussion in 'privacy general' started by Infinity, Nov 30, 2004.

Thread Status:
Not open for further replies.
  1. Infinity

    Infinity Registered Member

    Joined:
    May 31, 2004
    Posts:
    2,651
    I would like to understand spyware better. how are signatures made?

    I think personally that the path and name will be the signature so they can be located and cleaned.

    What do you think, can you help me out how it would be done?


    it is appreciated.


    Inf.
     
  2. Infinity

    Infinity Registered Member

    Joined:
    May 31, 2004
    Posts:
    2,651
    I really cannot believe my eyes, you don't have a clue o_O?

    just tell me how you think they do it. Thanx
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.