HOME
*



picture info

Igor Muttik
Igor Muttik (born 1962 in Russia) is a computer security expert, researcher and inventor. Career Igor Muttik is a Senior Principal Research Architect with McAfee which is part of Intel Corporation since 2011. He started researching computer malware in 1980s when anti-virus industry was in its infancy. Muttik holds a PhD degree in physics and mathematics from the Moscow State University. He has been a member of CARO (Computer Antivirus Research Organization) since 1994, and worked as a virus researcher for Dr Solomon's Antivirus, Dr. Solomon’s Software. Since 1998 Muttik was running McAfee’s anti-malware research in Europe, the Middle East and Africa, EMEA and switched to his architectural role in 2002. In 2008 he was one of the co-founders of AMTSO (Anti-Malware Testing Standards Organization) and was on the Board of AMTSO for 3 years. Muttik was also a co-founder of Industry Connections Security Group (ICSG is part of IEEE) - he is the chair of the software taggant, taggant sy ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Igor Muttik
Igor Muttik (born 1962 in Russia) is a computer security expert, researcher and inventor. Career Igor Muttik is a Senior Principal Research Architect with McAfee which is part of Intel Corporation since 2011. He started researching computer malware in 1980s when anti-virus industry was in its infancy. Muttik holds a PhD degree in physics and mathematics from the Moscow State University. He has been a member of CARO (Computer Antivirus Research Organization) since 1994, and worked as a virus researcher for Dr Solomon's Antivirus, Dr. Solomon’s Software. Since 1998 Muttik was running McAfee’s anti-malware research in Europe, the Middle East and Africa, EMEA and switched to his architectural role in 2002. In 2008 he was one of the co-founders of AMTSO (Anti-Malware Testing Standards Organization) and was on the Board of AMTSO for 3 years. Muttik was also a co-founder of Industry Connections Security Group (ICSG is part of IEEE) - he is the chair of the software taggant, taggant sy ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

DEF CON
DEF CON (also written as DEFCON, Defcon or DC) is a hacker convention held annually in Las Vegas, Nevada. The first DEF CON took place in June 1993 and today many attendees at DEF CON include computer security professionals, journalists, lawyers, federal government employees, security researchers, students, and hackers with a general interest in software, computer architecture, hardware modification, conference badges, and anything else that can be "hacked". The event consists of several tracks of speakers about computer- and hacking-related subjects, as well as cyber-security challenges and competitions (known as hacking wargames). Contests held during the event are extremely varied, and can range from creating the longest Wi-Fi connection to finding the most effective way to cool a beer in the Nevada heat. Other contests, past and present, include lockpicking, robotics-related contests, art, slogan, coffee wars, scavenger hunt and Capture the Flag. Capture the Flag (CTF) is p ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


1962 Births
Year 196 ( CXCVI) was a leap year starting on Thursday (link will display the full calendar) of the Julian calendar. At the time, it was known as the Year of the Consulship of Dexter and Messalla (or, less frequently, year 949 '' Ab urbe condita''). The denomination 196 for this year has been used since the early medieval period, when the Anno Domini calendar era became the prevalent method in Europe for naming years. Events By place Roman Empire * Emperor Septimius Severus attempts to assassinate Clodius Albinus but fails, causing Albinus to retaliate militarily. * Emperor Septimius Severus captures and sacks Byzantium; the city is rebuilt and regains its previous prosperity. * In order to assure the support of the Roman legion in Germany on his march to Rome, Clodius Albinus is declared Augustus by his army while crossing Gaul. * Hadrian's wall in Britain is partially destroyed. China * First year of the '' Jian'an era of the Chinese Han Dynasty. * Emperor Xian ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Living People
Related categories * :Year of birth missing (living people) / :Year of birth unknown * :Date of birth missing (living people) / :Date of birth unknown * :Place of birth missing (living people) / :Place of birth unknown * :Year of death missing / :Year of death unknown * :Date of death missing / :Date of death unknown * :Place of death missing / :Place of death unknown * :Missing middle or first names See also * :Dead people * :Template:L, which generates this category or death years, and birth year and sort keys. : {{DEFAULTSORT:Living people 21st-century people People by status ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Antivirus Software
Antivirus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware. Antivirus software was originally developed to detect and remove computer viruses, hence the name. However, with the proliferation of other malware, antivirus software started to protect from other computer threats. In particular, modern antivirus software can protect users from malicious browser helper objects (BHOs), browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious LSPs, dialers, fraud tools, adware, and spyware. Some products also include protection from other computer threats, such as infected and malicious URLs, spam, scam and phishing attacks, online identity (privacy), online banking attacks, social engineering techniques, advanced persistent threat (APT), and botnet DDoS attacks. History 1949–1980 period (pre-antivirus days) Although the roots of the computer ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Anti-tamper Software
Anti-tamper software is software which makes it harder for an attacker to modify it. The measures involved can be passive such as obfuscation to make reverse engineering difficult or active tamper-detection techniques which aim to make a program malfunction or not operate at all if modified. It is essentially tamper resistance implemented in the software domain. It shares certain aspects but also differs from related technologies like copy protection and trusted hardware, though it is often used in combination with them. Anti-tampering technology typically makes the software somewhat larger and also has a performance impact. There are no provably secure software anti-tampering methods; thus, the field is an arms race between attackers and software anti-tampering technologies. Tampering can be malicious, to gain control over some aspect of the software with an unauthorized modification that alters the computer program code and behaviour. Examples include installing rootkits and ba ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Runtime Packer
Executable compression is any means of compressing an executable file and combining the compressed data with decompression code into a single executable. When this compressed executable is executed, the decompression code recreates the original code from the compressed code before executing it. In most cases this happens transparently so the compressed executable can be used in exactly the same way as the original. Executable compressors are often referred to as "runtime packers", "software packers", "software protectors" (or even " polymorphic packers" and " obfuscating tools"). A compressed executable can be considered a self-extracting archive, where a compressed executable is packaged along with the relevant decompression code in an executable file. Some compressed executables can be decompressed to reconstruct the original program file without being directly executed. Two programs that can be used to do this are CUP386 and UNP. Most compressed executables decompress the or ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


EPSRC
The Engineering and Physical Sciences Research Council (EPSRC) is a British Research Council that provides government funding for grants to undertake research and postgraduate degrees in engineering and the physical sciences, mainly to universities in the United Kingdom. EPSRC research areas include mathematics, physics, chemistry, artificial intelligence and computer science, but exclude particle physics, nuclear physics, space science and astronomy (which fall under the remit of the Science and Technology Facilities Council). Since 2018 it has been part of UK Research and Innovation, which is funded through the Department for Business, Energy and Industrial Strategy. History EPSRC was created in 1994. At first part of the Science and Engineering Research Council (SERC), in 2018 it was one of nine organisations brought together to form UK Research and Innovation (UKRI). Its head office is in Swindon, Wiltshire in the same building (Polaris House) that houses the AHRC, BBSRC, ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

RHUL
Royal Holloway, University of London (RHUL), formally incorporated as Royal Holloway and Bedford New College, is a public research university and a constituent college of the federal University of London. It has six schools, 21 academic departments and approximately 10,500 undergraduate and postgraduate students from over 100 countries. The campus is located west of Egham, Surrey, from central London. The Egham campus was founded in 1879 by the Victorian entrepreneur and philanthropist Thomas Holloway. Royal Holloway College was officially opened in 1886 by Queen Victoria as an all-women college. It became a member of the University of London in 1900. In 1945, the college admitted male postgraduate students, and in 1965, around 100 of the first male undergraduates. In 1985, Royal Holloway merged with Bedford College (another former all-women's college in London). The merged college was named Royal Holloway and Bedford New College (RHBNC), this remaining the official registered ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Information Security Group
Founded in 1990, the Information Security Group (ISG) is an academic department focusing on Information and Cyber Security within the Engineering, Physical Sciences and Mathematics School (EPMS) at Royal Holloway, University of London. It has around 25 established academic posts, 7 visiting Professors/Fellows and over 90 research students. The Founder Director of the ISG was Professor Fred Piper, and the current director is Professor Chris Mitchell. Previous directors include Professors Peter Komisarczuk, Keith Martin, Keith Mayes and Peter Wild. In 1998 the ISG was awarded a Queen's Anniversary Prize in recognition of its work in the field of information security. It has also been awarded the status of Academic Centre of Excellence in Cyber Security Research (ACE-CSR) and hosts a Centre for Doctoral Training in cyber security (led by Professor Keith Martin). In 1992, the ISG introduced an MSc in information security, being the first university in the world to offer a postgradua ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


EICAR (Research Institute)
The European Institute for Computer Antivirus Research (EICAR) was founded in 1991 as an organization aiming to further antivirus research and improving development of antivirus software. Recently EICAR has furthered its scope to include the research of malicious software (malware) other than computer viruses and extended work on other information security topics like content security, Wireless LAN security, RFID and information security awareness. EICAR also organizes international security conferences most years, as well as a number of working groups or 'task forces'. Acronym "EICAR" was originally an abbreviation for ''"European Institute for Computer Antivirus Research"'', but the organisation no longer uses that full title, and now regards "EICAR" as a self-standing name, as it has expanded into a broader range of IT Security work than just antivirus research. EICAR test file EICAR, in collaboration with CARO (Computer AntiVirus Research Organization), developed the EICAR te ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Virus Bulletin
''Virus Bulletin'' is a magazine about the prevention, detection and removal of malware and spam. It regularly features analyses of the latest virus threats, articles exploring new developments in the fight against viruses, interviews with anti-virus experts, and evaluations of current anti-malware products. History and profile ''Virus Bulletin'' was founded in 1989 as a monthly hardcopy magazine, and later distributed electronically in PDF format. The monthly publication format was discontinued in July 2014 and articles are now made available as standalone pieces on the web site. The magazine was originally located in the Sophos headquarters in Abingdon, Oxfordshire in the UK. It was co-founded and is owned by Jan Hruska and Peter Lammer, the co-founders of Sophos. ''Virus Bulletin'' claims to have full editorial independence and not to favour Sophos products in its tests and reviews. Technical experts from anti-virus vendors have written articles for the magazine, which also c ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]