and Bagle seemed to enter a war to determine who could capture the most email addresses <td

for example) • Modify system file • Modify ordinary executable program Conceal self • Intercept system calls that would reveal self and falsify result • Classify self as “hidden” file Spread infection • Infect boot sector • Infect systems program • Infect ordinary program • Infect data ordinary program reads to control its execution Prevent […]