linkedin post 2019-06-11 03:45:52

Uncategorized
MALWARE. "Malicious programmers have sought to protect their encrypted code from this virus-scanning strategy by rewriting the unencrypted decryption engine (and the resulting encrypted payload) each time the virus or worm is propagated. Anti-virus software uses sophisticated pattern analysis to find underlying patterns within the different mutations of the decryption engine, in hopes of reliably detecting such malware." https://lnkd.in/dZPjiRS View in LinkedIn
Read More

linkedin post 2019-06-09 03:45:29

Uncategorized
THYROID HORMONE DISRUPTERS. "Chemical disruption of the thyroid axis using thiourea or methimazole (MMI) delays or stops stomach development in the Japanese flounder (Paralichthys olivaceus) and otolith mineralization in the Southern flounder (Paralichthys lethostigma). The importance of thyroid hormones during metamorphosis is further emphasized in other flatfish species where they have been shown to be important for the maturation of the muscle, stomach and skin." https://lnkd.in/du68ipH View in LinkedIn
Read More

linkedin post 2019-06-11 03:42:51

Uncategorized
POLYMORPHIC CODE. "In computer terminology, polymorphic code is code that uses a polymorphic engine to mutate while keeping the original algorithm intact. That is, the code changes itself each time it runs, but the function of the code (its semantics) will not change at all. For example, 1+3 and 6-2 both achieve the same result while using different code. This technique is sometimes used by computer viruses, shellcodes and computer worms to hide their presence." https://lnkd.in/dZPjiRS View in LinkedIn
Read More

linkedin post 2019-06-11 03:39:30

Uncategorized
DUPLICATE EXACTNESS. "From cell division to cell division, the error rate for DNA polymerase combined with other repair enzymes is about 1 mistake in 1 billion base pairs copied. At this rate, there are about 6 mistakes with each diploid cell replication event. With a male/female average of 29 mitotic divisions before the production of the next generation, this works out to be about 175 mutations per generation." https://lnkd.in/dSzSV3z View in LinkedIn
Read More

linkedin post 2019-06-13 03:49:57

Uncategorized
NEVER THE SAME. "Material metamorphosis does exist in real life. For instance, shape memory polymers have the ability to transform back to their parent shape when heated. Metamorphic computer viruses have the ability to change their shape by themselves from one form to another, but they usually avoid generating instances that are very close to their parent shape." (Claytronics and programmable matter). https://lnkd.in/d_2z5qc View in LinkedIn
Read More

linkedin post 2019-06-13 03:46:58

Uncategorized
METAMORPHIC VIRUSES. "Metamorphics are body-polymorphics." Metamorphic viruses do not have a decryptor or a constant virus body but are able to create new generations that look different. They do not use a data area filled with string constants but have one single-code body that carries data as code." https://lnkd.in/d_2z5qc View in LinkedIn
Read More

linkedin post 2019-06-12 05:13:06

Uncategorized
IMMUNE ESCAPE. "A program can metamorph by translating its own code into a temporary representation, edit the temporary representation of itself, and then write itself back to normal code again. As this process is done on the entire virus the engine also undergoes changes and the whole virus changes with it. The change is made, of course, to attempt to avoid scanners." Not dissimilar to cancer cells. https://lnkd.in/eAcnzhY View in LinkedIn
Read More

linkedin post 2019-06-12 05:11:34

Uncategorized
STATISTICALLY UNDETECTABLE. "Metamorphic viruses transform their code as they propagate, thus evading detection by static signature-based virus scanners and have the potential to lead to a breed of malicious programs that are virtually undetectable statistically." https://lnkd.in/eXJNZSa View in LinkedIn
Read More