ก้าวเข้าสู่โลกแห่งเรื่องราวอันไม่มีที่สิ้นสุด
ประวัติศาสตร์
Please note: This audiobook has been created using AI Voice.
Please note: This is a companion version & not the original book.
Sample Book Insights:
#1 In 2010, Sergey Ulasen, head of the antivirus division of a small computer security firm in Belarus, found a computer virus that used a rootkit to cloak itself and make it invisible to antivirus engines. It used a shrewd zero-day exploit to spread from machine to machine.
#2 The mystery files came to the attention of VirusBlokAda when a reseller in Iran reported a persistent problem with a customer’s machine. The computer was caught in a reboot loop, crashing and rebooting repeatedly while defying the efforts of technicians to control it.
#3 The two hackers found a rootkit on the system in Iran that was designed to hide four malicious. LNK files. The malware appeared to be using an exploit to spread itself via infected USB flash drives. The rootkit prevented the. LNK files from being seen on the flash drive.
#4 The LNK exploit attacked a fundamental feature of Windows systems, and was much more severe than Autorun exploits. It was discovered by a security firm that had never heard of VirusBlokAda. The drivers that were dropped onto targeted machines were signed with a legitimate digital certificate from a company called RealTek Semiconductor.
© 2022 Distill Books (หนังสือเสียง ): 9798350045888
วันที่วางจำหน่าย
หนังสือเสียง : 25 ตุลาคม 2565
ภาษาไทย
ประเทศไทย