|
This is... a small primer for those who don’t quite get all this anti-malware stuff. At its core anti-malware seems pretty straightforward. You take something that can be run (usually an “image” or “executable”, but for sake of the audience we’ll just say App) and run a mathematical algorithm over it that produces an (almost) unique identifier for that App. Generally that unique identifier is called a Hash (because of the technique used). Anytime you run the same algorithm over the same App you get the same Hash.... If someone modifies an app, even slightly, it will have a different Hash. So the Hash tells you exactly what you have. Why Reputation is so important: It’s really the only technique that gets ahead of the Malware authors.
|
|
|
|
|
Turned off when I saw "App"
=====
\ | /
\|/
|
|-----|
| |
|_ |
_) | /
_) __/_
_) ____
| /|
| / |
| |
|-----|
|
=====
===
=
|
|
|
|
|
The article opened by saying it was written for lusers; not we geeks. App is a perfectly acceptable term in that context.
Did you ever see history portrayed as an old man with a wise brow and pulseless heart, waging all things in the balance of reason?
Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful?
--Zachris Topelius
Training a telescope on one’s own belly button will only reveal lint. You like that? You go right on staring at it. I prefer looking at galaxies.
-- Sarah Hoyt
|
|
|
|
|
I also was very explicit in saying I was going to do that (use App instead of Image or Executable) because of the target audience.
|
|
|
|
|
I forgot the invention of smartphones stopped users remembering what program meant.
=====
\ | /
\|/
|
|-----|
| |
|_ |
_) | /
_) __/_
_) ____
| /|
| / |
| |
|-----|
|
=====
===
=
|
|
|
|