{"id":402,"date":"2006-11-28T10:56:45","date_gmt":"2006-11-28T10:56:45","guid":{"rendered":"https:\/\/www.darknet.org.uk\/2006\/11\/the-art-of-virology-01h\/"},"modified":"2017-06-05T00:41:59","modified_gmt":"2017-06-04T16:41:59","slug":"the-art-of-virology-01h","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2006\/11\/the-art-of-virology-01h\/","title":{"rendered":"the Art of Virology 01h"},"content":{"rendered":"
In this part we will discuss the basic framework of a computer virus… The basics of a virus consists of two elementary procedures (others will tell you three). These are:<\/p>\n
This routine will have to be a more delicate one [but not hard to analyze at all], because as besides the search routine itself we will include file validation two, we will check within this routine if the file is read-only file, not as in some cases in which I saw that the virus search the file, found it and only when trying to infect it he realised that is read-only, and if no check done for it the virus would crash.<\/p>\n